www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Wed, 29 May 2019 02:01:01 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/05/29 02:01:00

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-amazon.de-diff.html 
                         malware-amazon.de.po malware-amazon.es.po 
                         malware-amazon.fr.po 
                         malware-amazon.it-diff.html 
                         malware-amazon.it.po 
                         malware-amazon.ja-diff.html 
                         malware-amazon.ja.po malware-amazon.pot 
                         malware-amazon.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.427&r2=1.428
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.524&r2=1.525
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.242&r2=1.243
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.88&r2=1.89

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- de.po       28 May 2019 11:03:19 -0000      1.89
+++ de.po       29 May 2019 06:00:57 -0000      1.90
@@ -539,6 +539,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- es.po       28 May 2019 11:03:21 -0000      1.119
+++ es.po       29 May 2019 06:00:57 -0000      1.120
@@ -413,6 +413,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- fr.po       18 May 2019 12:25:57 -0000      1.153
+++ fr.po       29 May 2019 06:00:57 -0000      1.154
@@ -416,6 +416,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- it.po       28 May 2019 11:03:21 -0000      1.89
+++ it.po       29 May 2019 06:00:57 -0000      1.90
@@ -498,6 +498,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- ja.po       18 May 2019 08:29:44 -0000      1.88
+++ ja.po       29 May 2019 06:00:57 -0000      1.89
@@ -448,6 +448,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-amazon.de-diff.html 27 Apr 2019 19:30:03 -0000      1.20
+++ malware-amazon.de-diff.html 29 May 2019 06:00:57 -0000      1.21
@@ -63,13 +63,13 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;</em></ins></span>
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;h2</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
 
-&lt;p class="c" style="font-size: 1.2em"&gt;
+<span class="inserted"><ins><em>&lt;p class="c" style="font-size: 1.2em"&gt;
 &nbsp;&lt;a href="#swindle"&gt;Kindle&nbsp;Swindle&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#echo"&gt;Echo&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#misc"&gt;Other&nbsp;products&lt;/a&gt;&nbsp;
@@ -207,6 +207,28 @@
 <span class="inserted"><ins><em>&lt;h4 
id="echo-surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904240"&gt;
     &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
@@ -348,7 +370,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/27 19:30:03 $
+$Date: 2019/05/29 06:00:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-amazon.de.po        27 Apr 2019 19:30:03 -0000      1.24
+++ malware-amazon.de.po        29 May 2019 06:00:57 -0000      1.25
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2017-09-26 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -280,6 +280,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: malware-amazon.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- malware-amazon.es.po        1 May 2019 08:47:34 -0000       1.32
+++ malware-amazon.es.po        29 May 2019 06:00:57 -0000      1.33
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2019-05-01 10:40+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -212,6 +213,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: malware-amazon.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-amazon.fr.po        28 Apr 2019 13:35:40 -0000      1.38
+++ malware-amazon.fr.po        29 May 2019 06:00:57 -0000      1.39
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2019-04-28 15:33+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -208,6 +209,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-amazon.it-diff.html 27 Apr 2019 19:30:03 -0000      1.34
+++ malware-amazon.it-diff.html 29 May 2019 06:00:57 -0000      1.35
@@ -63,13 +63,13 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;</em></ins></span>
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;h2</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
 
-&lt;p class="c" style="font-size: 1.2em"&gt;
+<span class="inserted"><ins><em>&lt;p class="c" style="font-size: 1.2em"&gt;
 &nbsp;&lt;a href="#swindle"&gt;Kindle&nbsp;Swindle&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#echo"&gt;Echo&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#misc"&gt;Other&nbsp;products&lt;/a&gt;&nbsp;
@@ -207,6 +207,28 @@
 <span class="inserted"><ins><em>&lt;h4 
id="echo-surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904240"&gt;
     &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
@@ -348,7 +370,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/27 19:30:03 $
+$Date: 2019/05/29 06:00:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-amazon.it.po        27 Apr 2019 19:30:03 -0000      1.27
+++ malware-amazon.it.po        29 May 2019 06:00:57 -0000      1.28
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2017-09-30 22:48+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -258,6 +258,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-amazon.ja-diff.html 27 Apr 2019 19:30:03 -0000      1.31
+++ malware-amazon.ja-diff.html 29 May 2019 06:00:57 -0000      1.32
@@ -196,6 +196,28 @@
 &lt;h4 id="echo-surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904240"&gt;
     &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
@@ -337,7 +359,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/27 19:30:03 $
+$Date: 2019/05/29 06:00:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-amazon.ja.po        27 Apr 2019 19:30:04 -0000      1.18
+++ malware-amazon.ja.po        29 May 2019 06:00:57 -0000      1.19
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2016-10-31 11:24+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -227,6 +227,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: malware-amazon.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-amazon.pot  27 Apr 2019 19:30:04 -0000      1.17
+++ malware-amazon.pot  29 May 2019 06:00:57 -0000      1.18
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -154,6 +154,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a "
+"href=\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php\";>
 "
+"the data remain on other servers</a>, where they can be accessed by "
+"advertising companies and government agencies. In other words, deleting the "
+"collected information doesn't cancel the wrong of collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips "
+"Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos "
+"speakers are likewise stored longer than necessary on the servers the "
+"devices are tethered to. Moreover, they are made available to Alexa. As a "
+"result, Amazon has a very precise picture of users' life at home, not only "
+"in the present, but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a "
 
"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\";>
 "
 "recorded for Amazon employees to listen to</a>. The Google and Apple voice "

Index: malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- malware-amazon.ru.po        28 Apr 2019 10:29:25 -0000      1.41
+++ malware-amazon.ru.po        29 May 2019 06:00:57 -0000      1.42
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2018-10-08 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -209,6 +210,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- nl.po       28 May 2019 11:03:21 -0000      1.89
+++ nl.po       29 May 2019 06:00:57 -0000      1.90
@@ -407,6 +407,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- pl.po       28 May 2019 11:03:21 -0000      1.89
+++ pl.po       29 May 2019 06:00:57 -0000      1.90
@@ -351,6 +351,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- pot 18 May 2019 08:29:44 -0000      1.88
+++ pot 29 May 2019 06:00:57 -0000      1.89
@@ -296,6 +296,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary-surveillance.de-diff.html       10 May 2019 17:02:55 -0000      
1.72
+++ proprietary-surveillance.de-diff.html       29 May 2019 06:00:57 -0000      
1.73
@@ -1086,7 +1086,8 @@
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="removed"><del><strong>TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
@@ -1139,14 +1140,15 @@
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
     of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
+    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span class="removed"><del><strong>read logs
+      for</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
+    in</em></ins></span> other <span class="inserted"><ins><em>ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
+    &lt;p&gt;This is evidence that proprietary</em></ins></span> apps <span 
class="inserted"><ins><em>generally work against
+    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>also core system logs. TigerVPN 
developers</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android users
     need to get rid of the proprietary software&mdash;both proprietary
     Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
@@ -1161,29 +1163,26 @@
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each
+    &lt;p&gt;Grindr should not</em></ins></span> have <span 
class="removed"><del><strong>confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>so much information about its users.
+    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>LinkedIn. Also, it stores detailed 
logs</strong></del></span> <span class="inserted"><ins><em>each
     other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
+    &lt;p&gt;The moviepass app</em></ins></span> and <span 
class="removed"><del><strong>may turn</strong></del></span> <span 
class="inserted"><ins><em>dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>after 
going</em></ins></span> to <span class="removed"><del><strong>read logs
-      for other</strong></del></span> <span class="inserted"><ins><em>a 
movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android</em></ins></span> apps
-    <span class="inserted"><ins><em>is pervasive</em></ins></span> and <span 
class="removed"><del><strong>also core system logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>sometimes very clever. Some trackers can &lt;a
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
@@ -1193,7 +1192,7 @@
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book</em></ins></span> to <span class="removed"><del><strong>LinkedIn. 
Also, it stores detailed logs</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that this article misuses 
the words
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
@@ -1201,9 +1200,9 @@
   &lt;li id="M201707270"&gt;
     &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls</em></ins></span> and <span class="removed"><del><strong>may 
turn</strong></del></span> <span 
class="inserted"><ins><em>sent</em></ins></span> them <span 
class="removed"><del><strong>over</strong></del></span> <span 
class="inserted"><ins><em>and text messages and emails</em></ins></span> to 
<span class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls and sent</em></ins></span> them <span 
class="removed"><del><strong>over</strong></del></span> <span 
class="inserted"><ins><em>and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; 
on</em></ins></span> the <span class="removed"><del><strong>UK government if
+    &lt;p&gt;Google did not intend</em></ins></span> to <span 
class="inserted"><ins><em>make these apps spy; on</em></ins></span> the <span 
class="removed"><del><strong>UK government if
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -1220,14 +1219,14 @@
 
     &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
     &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers of this app have
-      confirmed that</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares in</em></ins></span> the 
<span class="removed"><del><strong>non-premium version</strong></del></span> 
<span class="inserted"><ins><em>responsibility for the injustice of their being
+      roughly 5 tracking libraries. Developers</strong></del></span>
+    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice</em></ins></span> of <span class="removed"><del><strong>this 
app</strong></del></span> <span class="inserted"><ins><em>their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="inserted"><ins><em>preventing apps from
+    &lt;p&gt;Could Google</em></ins></span> have
+      <span class="removed"><del><strong>confirmed that the non-premium 
version</strong></del></span> <span class="inserted"><ins><em>done a better 
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
@@ -1265,18 +1264,17 @@
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps</strong></del></span> <span 
class="inserted"><ins><em>they don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201705040"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;</em></ins></span>
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by TV <span 
class="removed"><del><strong>programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
@@ -1293,146 +1291,149 @@
     along with the headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said</em></ins></span> that <span 
class="removed"><del><strong>track</strong></del></span> users <span 
class="removed"><del><strong>by</strong></del></span> <span 
class="inserted"><ins><em>gave consent for this,
-    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>ultrasound from 
beacons placed in stores or played by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;</em></ins></span>
+  &lt;li id="M201704074"&gt;
     &lt;p&gt;Pairs of Android apps can collude
     to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
+  &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>that it will&lt;/a&gt; pre-install
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
     on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and</em></ins></span> the 
<span class="removed"><del><strong>personal details</strong></del></span> <span 
class="inserted"><ins><em>user must
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>spyware is
-    still spyware.&lt;/p&gt;
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201701210"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit users' 
personal</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user</em></ins></span> data to <span class="removed"><del><strong>servers. 
&lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app tracks &lt;a
-    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
 
-    &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo; for surveillance is inadequate as a protection against
+  <span class="inserted"><ins><em>&lt;li id="M201611280"&gt;
+    &lt;p&gt;The Uber</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>tracks</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>user's
+    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading</strong></del></span> <span 
class="inserted"><ins><em>inadequate as a protection against
     massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611160"&gt;
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>install</strong></del></span> <span 
class="inserted"><ins><em>investigated</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>privacy and security of
-    283 Android VPN apps concluded that &ldquo;in spite of the promises
-    for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may be unawarely subject to poor security
-    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Following is a non-exhaustive list, taken from</em></ins></span> 
the <span 
class="removed"><del><strong>&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>research paper,</em></ins></span>
-    of <span class="inserted"><ins><em>some proprietary VPN apps that 
track</em></ins></span> users <span class="removed"><del><strong>is not 
enough</strong></del></span> <span class="inserted"><ins><em>and infringe their
-    privacy:&lt;/p&gt;
-
-    &lt;dl class="compact"&gt;
-      &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant</em></ins></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> users <span 
class="removed"><del><strong>have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> and <span class="removed"><del><strong>honestly 
identify</strong></del></span> <span class="inserted"><ins><em>show them 
targeted ads.&lt;/dd&gt;
-
-      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, instead
-of hiding</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
+    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>privacy</em></ins></span> and <span 
class="removed"><del><strong>Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>security of
+    283 Android VPN apps concluded</em></ins></span> that <span 
class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>&ldquo;in 
spite</em></ins></span> of <span class="removed"><del><strong>hiding it in an 
obscurely worded EULA.&lt;/p&gt;
 
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>has 
full access</em></ins></span> to <span class="removed"><del><strong>truly 
protect people's privacy, we must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>users'
-      text messages.&lt;/dd&gt;
-
-      &lt;dt&gt;DroidVPN</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in the first
+&lt;p&gt;However, to truly protect people's</strong></del></span> <span 
class="inserted"><ins><em>the promises
+    for</em></ins></span> privacy, <span class="removed"><del><strong>we must 
prevent Google</strong></del></span> <span 
class="inserted"><ins><em>security,</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span class="inserted"><ins><em>anonymity 
given by</em></ins></span> the <span class="removed"><del><strong>first
 place!&lt;/p&gt;
 &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
+    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>majority</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span> <span 
class="inserted"><ins><em>TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to read 
logs
-      for other apps</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>also core system logs. TigerVPN developers have
-      confirmed this.&lt;/dd&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
-      may turn them over</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.  This is
-    yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>UK government if requested.&lt;/dd&gt;
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example</strong></del></span> <span 
class="inserted"><ins><em>VPN
+    apps&mdash;millions</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>users may be unawarely 
subject</em></ins></span> to <span class="removed"><del><strong>obey the user,
+    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-      &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a thing would be almost
+    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
     unthinkable with free software.&lt;/p&gt;
 
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;More than 73%</strong></del></span>
-      <span class="inserted"><ins><em>users. The stated 
purpose</em></ins></span> of the <span class="removed"><del><strong>most 
popular Android apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span class="inserted"><ins><em>JS 
injection is to display ads. Uses
-      roughly five tracking libraries. Also, it redirects the user's
-      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
-
-      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and 
<span class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>also uses roughly
-      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;More than 73% of</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the 
<span class="removed"><del><strong>most popular Android</strong></del></span> 
<span class="inserted"><ins><em>research paper,
+    of some proprietary VPN</em></ins></span> apps
+  <span class="removed"><del><strong>&lt;a 
href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral</strong></del></span> <span class="inserted"><ins><em>that track 
users</em></ins></span> and <span class="removed"><del><strong>location 
information&lt;/a&gt; of</strong></del></span> <span 
class="inserted"><ins><em>infringe</em></ins></span> their <span 
class="removed"><del><strong>users with third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated 
to</strong></del></span> <span class="inserted"><ins><em>this app have 
confirmed that</em></ins></span>
-      the <span class="removed"><del><strong>app's functionality,
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span>
+    <span class="inserted"><ins><em>privacy:&lt;/p&gt;
+
+    &lt;dl class="compact"&gt;
+      &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant</em></ins></span> to <span class="inserted"><ins><em>track users 
and show them targeted ads.&lt;/dd&gt;
+
+      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
   was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span class="inserted"><ins><em>non-premium 
version of</em></ins></span> the <span class="removed"><del><strong>500 most 
popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+  found in</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full access to users'
+      text messages.&lt;/dd&gt;
+
+      &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="removed"><del><strong>say
   &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>app does JavaScript injection</em></ins></span> for 
<span class="removed"><del><strong>granted that</strong></del></span>
-      <span class="inserted"><ins><em>tracking</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>read logs</em></ins></span>
+      for <span class="removed"><del><strong>granted that the usual analytics 
tools are
+  legitimate, but is that valid?  Software</strong></del></span> <span 
class="inserted"><ins><em>other apps and also core system logs. 
TigerVPN</em></ins></span> developers have <span 
class="removed"><del><strong>no right</strong></del></span>
+      <span class="inserted"><ins><em>confirmed this.&lt;/dd&gt;
+
+      &lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic</em></ins></span> to
+  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
   just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>user</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>displaying ads.&lt;/dd&gt;
+      connect</strong></del></span> <span class="inserted"><ins><em>LinkedIn. 
Also, it stores detailed logs and
+      may turn them over</em></ins></span> to <span 
class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>the UK government if requested.&lt;/dd&gt;
+
+      &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display ads. Uses
+      roughly five tracking libraries. Also, it redirects the user's
+      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
+
+      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and 
<span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span class="inserted"><ins><em>also uses 
roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
@@ -1529,64 +1530,87 @@
         a server every phone number</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that <span 
class="inserted"><ins><em>include &lt;a
-    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio and TV programs
+    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>the user types into it&lt;/a&gt;; the server 
records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio</em></ins></span> and 
<span class="removed"><del><strong>receiving the code Apple
+      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511190"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to</em></ins></span> the <span class="removed"><del><strong>user 
types into it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
+    unrelated to</em></ins></span> the <span class="inserted"><ins><em>app's 
functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span class="removed"><del><strong>server 
records</strong></del></span> <span class="inserted"><ins><em>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    found in the 500</em></ins></span> most popular <span 
class="removed"><del><strong>iOS</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article should not have described</em></ins></span> these 
<span class="removed"><del><strong>numbers for at least 30
-        days.&lt;/p&gt;
+    &lt;p&gt;The article should not have described these</em></ins></span> apps
+      <span class="removed"><del><strong>&lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>apps as
+  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>as
     &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
-    to <span class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>say &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
+    to <span class="removed"><del><strong>Apple's servers 
all</strong></del></span> <span class="inserted"><ins><em>say &ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
-    legitimate, but is that valid? Software developers have no 
right</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and</em></ins></span> 47% of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, from Android 
and</em></ins></span> iOS <span 
class="removed"><del><strong>apps</strong></del></span>
-    <span class="inserted"><ins><em>respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        
href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span> 
<span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share</em></ins></span>
-    personal, behavioral and location information&lt;/a&gt; of their users with
-    third parties.&lt;/p&gt;
+    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
+    legitimate, but is that valid? Software developers have no 
right</em></ins></span> to <span class="removed"><del><strong>date on all your 
devices.
+      Any edits you make</strong></del></span>
+    <span class="inserted"><ins><em>analyze what users</em></ins></span> are 
<span class="removed"><del><strong>automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>doing 
or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
+  &lt;li id="M201510300"&gt;
+    &lt;p&gt;More than 73% and 47% of mobile applications, from Android and iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share
+    personal, behavioral and location</em></ins></span> information&lt;/a&gt; 
<span class="removed"><del><strong>as accessed on 24 Sep 2015.) The iCloud 
feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup</strong></del></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
-    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all the 
photos</strong></del></span> <span class="inserted"><ins><em>increased 
snooping&lt;/a&gt;,</em></ins></span> and
-      <span class="removed"><del><strong>videos</strong></del></span> <span 
class="inserted"><ins><em>some are starting
-    to realize that it is nasty.&lt;/p&gt;
+    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>their 
users with
+    third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201508210"&gt;
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span class="removed"><del><strong>a way 
to</strong></del></span>
+    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
+    to realize that</em></ins></span> it <span 
class="removed"><del><strong>still counts</strong></del></span> <span 
class="inserted"><ins><em>is nasty.&lt;/p&gt;
 
     &lt;p&gt;This article shows the &lt;a
     
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that</em></ins></span> they <span 
class="removed"><del><strong>make.&lt;/p&gt;
+    twisted ways that they present snooping</em></ins></span> as a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps</strong></del></span> <span class="inserted"><ins><em>present 
snooping as a way to &ldquo;serve&rdquo;
+    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude of the proprietary software industry
+    typical example</em></ins></span> of <span 
class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to break 
Apple's
+      security to get at them, but NSA can access any</strong></del></span> 
<span class="inserted"><ins><em>the attitude</em></ins></span> of <span 
class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -1595,156 +1619,167 @@
   &lt;li id="M201506264"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
-    study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis proprietary
-    Android apps contained recognizable tracking libraries. For the paid
+    study</em></ins></span> in <span 
class="removed"><del><strong>iThings:</strong></del></span> <span 
class="inserted"><ins><em>2015&lt;/a&gt; found that 90% of</em></ins></span> 
the <span class="removed"><del><strong>&lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>top-ranked gratis 
proprietary
+    Android apps contained recognizable tracking libraries. 
For</em></ins></span> the <span class="removed"><del><strong>iThing is,
+      and get other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That</strong></del></span> <span 
class="inserted"><ins><em>paid
     proprietary apps, it was only 60%.&lt;/p&gt;
 
-    &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of</em></ins></span> them <span 
class="removed"><del><strong>up</strong></del></span> <span 
class="inserted"><ins><em>are not in fact &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>talks about iOS 6,</strong></del></span> <span 
class="inserted"><ins><em>confusingly describes gratis apps as
+    &ldquo;free&rdquo;,</em></ins></span> but <span 
class="removed"><del><strong>it
+      is still true</strong></del></span> <span class="inserted"><ins><em>most 
of them are not</em></ins></span> in <span class="removed"><del><strong>iOS 
7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing</strong></del></span> <span 
class="inserted"><ins><em>fact &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  
It</em></ins></span> also
+      <span class="removed"><del><strong>&lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span class="inserted"><ins><em>uses the
+    ugly word &ldquo;monetize&rdquo;. A good replacement for</em></ins></span> 
that <span class="removed"><del><strong>can be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>word
+    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span 
class="removed"><del><strong>date</strong></del></span> <span 
class="inserted"><ins><em>100 &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+    &lt;p&gt;Gratis Android apps (but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect to 100 &lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs,</em></ins></span> on <span 
class="removed"><del><strong>all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
+    and advertising&lt;/a&gt; URLs, on</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>average.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA</strong></del></span>
 
-    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>the 
average.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
+    &lt;p&gt;Widely used &lt;a
+    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps</em></ins></span> snoop on <span 
class="removed"><del><strong>all</strong></del></span> the <span 
class="removed"><del><strong>data in an iThing,
+      or it</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;. This</em></ins></span> is <span 
class="removed"><del><strong>totally incompetent.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201504060"&gt;
-    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-      information&lt;/a&gt; as accessed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop</em></ins></span> on <span 
class="removed"><del><strong>24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>the 
user&lt;/a&gt;. This</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>in addition to
-    the snooping done</em></ins></span> by the
-      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>phone company, and perhaps by the OS in
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>in addition to
+    the snooping done by the phone company, and perhaps by the OS in
     the phone.&lt;/p&gt;
 
-    &lt;p&gt;Don't be distracted by the question</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>whether the app developers
-    get users to say &ldquo;I agree&rdquo;. That</em></ins></span> is <span 
class="inserted"><ins><em>no excuse for
+    &lt;p&gt;Don't be distracted by the question</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>whether the app developers
+    get users</em></ins></span> to <span class="removed"><del><strong>exist 
for</strong></del></span> <span class="inserted"><ins><em>say &ldquo;I 
agree&rdquo;. That is</em></ins></span> no
+      <span class="removed"><del><strong>possible 
purpose</strong></del></span> <span class="inserted"><ins><em>excuse for
     malware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411260"&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.  &lt;a
-    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in</em></ins></span> a way <span 
class="removed"><del><strong>to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts</strong></del></span> <span class="inserted"><ins><em>that at least is 
visible and optional&lt;/a&gt;. Not</em></ins></span>
-    as <span class="inserted"><ins><em>bad as what the others do.&lt;/p&gt;
+    report which</em></ins></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>apps</em></ins></span> 
the <span class="inserted"><ins><em>user has installed.</em></ins></span>  
&lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201401150.1"&gt;
-    &lt;p&gt;The Simeji keyboard is</em></ins></span> a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this to
-      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA can access any</strong></del></span> 
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span 
class="removed"><del><strong>them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the</strong></del></span> <span 
class="inserted"><ins><em>Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
-      and get other info too.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
-    title="Input Method 
Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this</em></ins></span> in <span 
class="removed"><del><strong>popular Android apps</strong></del></span> <span 
class="inserted"><ins><em>a way that at least</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>visible</em></ins></span> and
+      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Android tracks location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when</strong></del></span> <span 
class="inserted"><ins><em>optional&lt;/a&gt;. Not
+    as bad as what</em></ins></span> the <span 
class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201312270"&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose</em></ins></span> is 
<span class="removed"><del><strong>also a feature for web 
sites</strong></del></span> to <span class="removed"><del><strong>track users, 
which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 
6,</strong></del></span> <span class="inserted"><ins><em>restrict the
-    use of data on the user's computer,</em></ins></span> but it
-      <span class="removed"><del><strong>is still true in iOS 7.)&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> <span 
class="inserted"><ins><em>does surveillance too:</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of other people's phone
-    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201401150.1"&gt;
+    &lt;p&gt;The Simeji keyboard is a smartphone version of 
Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
+    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+  &lt;li id="M201312270"&gt;
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
+    use</em></ins></span> of data <span class="inserted"><ins><em>on the 
user's computer, but it does surveillance too: &lt;a
+    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation,</em></ins></span> for <span 
class="inserted"><ins><em>use by companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The FTC criticized this app because it asked</em></ins></span> 
the <span class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>get the user's list of other people's phone
+    numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop on all the</strong></del></span> <span 
class="inserted"><ins><em>user to
-    approve sending personal</em></ins></span> data <span 
class="removed"><del><strong>in an iThing,
-      or</strong></del></span> <span class="inserted"><ins><em>to the app 
developer but did not ask
-    about sending</em></ins></span> it <span class="removed"><del><strong>is 
totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;li id="M201312060"&gt;
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation, for use</em></ins></span> by <span 
class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The FTC criticized this app because it asked the user to
+    approve</em></ins></span> sending <span 
class="removed"><del><strong>hidden text messages which enable 
them</strong></del></span> <span class="inserted"><ins><em>personal 
data</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> the <span 
class="removed"><del><strong>phones
+      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>app developer but did not ask
+    about sending it</em></ins></span> to <span 
class="inserted"><ins><em>other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>microphone, retrieve geo-location data from 
the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>weakness of</em></ins></span>
+    the <span class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span 
class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> to 
<span class="removed"><del><strong>exist for no
-      possible purpose</strong></del></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>companies.  This shows 
the weakness of</em></ins></span>
-    the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
-    surveillance: why should a flashlight app send any information to
+  &lt;li&gt;&lt;p&gt;Samsung phones come with
+      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they send so much data that their transmission 
is</strong></del></span>
+    <span class="inserted"><ins><em>surveillance: why should</em></ins></span> 
a
+      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span class="inserted"><ins><em>flashlight app 
send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;FTC says most mobile apps</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
+      requested by the user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>children don't respect privacy:</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
     
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
-      sometimes very clever. Some trackers can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Android tracks location for Google</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span>
+    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS and microphone in Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
-    Microsoft changed Skype</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+    Microsoft changed Skype &lt;a
+    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1757,383 +1792,331 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201806240"&gt;
-    &lt;p&gt;Red Shell is a</em></ins></span> spyware <span 
class="removed"><del><strong>sending lots of</strong></del></span> <span 
class="inserted"><ins><em>that
-    is found in many proprietary games. It &lt;a
-    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers and sends it to third parties&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Red Shell is a spyware that</em></ins></span>
+    is <span class="inserted"><ins><em>found in many proprietary games. 
It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201804144"&gt;
-    &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data</em></ins></span> on
+      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>users' computers</em></ins></span> and <span 
class="removed"><del><strong>users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span> it <span 
class="removed"><del><strong>will eventually require all new portable 
phones</strong></del></span> to <span class="removed"><del><strong>have 
GPS.)&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>the massive
-    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span class="inserted"><ins><em>snoop on all 
open processes running on its user's computer&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
+    &lt;p&gt;ArenaNet surreptitiously installed a spyware
+    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>restrict
+      the use of data on</strong></del></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>massive
+    multiplayer game Guild Wars 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>get the</strong></del></span> <span 
class="inserted"><ins><em>snoop on all open processes running on 
its</em></ins></span> user's <span class="removed"><del><strong>list of other 
people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201711070"&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information</em></ins></span> to <span class="removed"><del><strong>turn 
the phones</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711070"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>moviepass app and 
dis-service spy</strong></del></span> <span class="inserted"><ins><em>driver 
for a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop</em></ins></span> on <span 
class="inserted"><ins><em>their users</em></ins></span> and <span 
class="removed"><del><strong>off, listen</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> to the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and web
-      browsing history, and read the contact list. This 
malware</strong></del></span>
-    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
+    video game consoles snoop</em></ins></span> on <span 
class="inserted"><ins><em>their</em></ins></span> users <span 
class="removed"><del><strong>even more than users
+      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before</strong></del></span> and <span 
class="removed"><del><strong>after going</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> to <span 
class="inserted"><ins><em>the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>designed to
-      disguise itself from investigation.&lt;/p&gt;
+    &lt;p&gt;A game console is</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a 
computer</em></ins></span> with
-    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
+    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer, and you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,</strong></del></span> and 
<span class="inserted"><ins><em>their users'
+    collect a wide range of data about their users</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note</strong></del></span> <span 
class="inserted"><ins><em>their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>send so much data</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks</em></ins></span> that 
<span class="removed"><del><strong>their transmission is a
-      substantial expense for users.  Said transmission, not wanted or
-      requested by</strong></del></span> <span 
class="inserted"><ins><em>merge</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>data
+    &lt;p&gt;Even nastier, they do it through ad networks</em></ins></span> 
that <span class="removed"><del><strong>this article 
misuses</strong></del></span> <span 
class="inserted"><ins><em>merge</em></ins></span> the <span 
class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend a lot</em></ins></span> of 
<span class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;They use this data</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens</strong></del></span> <span class="inserted"><ins><em>money. 
They also
-    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>voice all</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
-
-    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what</strong></del></span> <span 
class="inserted"><ins><em>manipulate</em></ins></span> people <span 
class="removed"><del><strong>are listening</strong></del></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In addition, it 
may</strong></del></span> <span class="inserted"><ins><em>buy things, and hunt 
for
+    &ldquo;whales&rdquo; who can</em></ins></span> be <span 
class="removed"><del><strong>analyzing people's conversations to serve them 
with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an</strong></del></span> article <span 
class="removed"><del><strong>blocked from us by a paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI</strong></del></span> <span class="inserted"><ins><em>describes 
gratis games, games that cost money</em></ins></span>
-    can <span class="removed"><del><strong>remotely 
activate</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="removed"><del><strong>GPS and microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>same 
tactics.&lt;/p&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>led</em></ins></span> to <span 
class="removed"><del><strong>do lots</strong></del></span> <span 
class="inserted"><ins><em>spend a lot</em></ins></span> of <span 
class="removed"><del><strong>surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>money. They also
+    use a back door</em></ins></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give 
Verizon</strong></del></span> <span 
class="inserted"><ins><em>manipulate</em></ins></span> the <span 
class="removed"><del><strong>same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>game play for specific players.&lt;/p&gt;
+
+    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, 
games</em></ins></span> that <span class="removed"><del><strong>Google normally 
gets when
+   they</strong></del></span> <span class="inserted"><ins><em>cost money
+    can</em></ins></span> use <span class="removed"><del><strong>its search 
engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> the <span 
class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry Birds &lt;a
-    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-    more spyware apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies,</em></ins></span> and the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app</strong></del></span> <span class="inserted"><ins><em>NSA</em></ins></span> 
takes <span class="removed"><del><strong>effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece 
of</strong></del></span> <span class="inserted"><ins><em>advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    more</em></ins></span> spyware <span class="removed"><del><strong>is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More about NSA</em></ins></span> app <span 
class="removed"><del><strong>&lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to</strong></del></span> <span 
class="inserted"><ins><em>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location</strong></del></span>
+  &lt;li id="M200510200"&gt;
+    &lt;p&gt;Blizzard Warden is</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
-    &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies</em></ins></span> on
-      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>every process running on a gamer's 
computer</em></ins></span> and <span class="removed"><del><strong>users cannot 
stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to</strong></del></span> <span class="inserted"><ins><em>sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities 
which</em></ins></span>
-    have <span 
class="removed"><del><strong>GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nothing to do with 
cheating.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can</strong></del></span> <span class="inserted"><ins><em>hidden
+    &ldquo;cheating-prevention&rdquo; program that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies</em></ins></span> on <span class="removed"><del><strong>many sorts 
of data in the phone,</strong></del></span> <span 
class="inserted"><ins><em>every process running on a gamer's 
computer</em></ins></span> and <span class="inserted"><ins><em>sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities which
+    have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>Connected Equipment&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="inserted"><ins><em>people that</em></ins></span> use <span 
class="removed"><del><strong>of data on</strong></del></span> <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article uses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
 
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>people 
that use them&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
-&lt;/div&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see 
you</em></ins></span> on <span class="removed"><del><strong>users even more 
than users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before and after going to a movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>inadequate as a protection against massive
+        surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
-    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; 
Evidently</em></ins></span> that <span 
class="removed"><del><strong>include</strong></del></span> <span 
class="inserted"><ins><em>was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email 
addresses&lt;/a&gt;</strong></del></span>
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio 
and</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>user's address
-      book to developer's server.  Note that this article 
misuses</strong></del></span> the <span 
class="inserted"><ins><em>own</em></ins></span> words
-      <span class="removed"><del><strong>&ldquo;&lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;
+    collect &ldquo;whatever the</em></ins></span> TV <span 
class="removed"><del><strong>programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>sees,&rdquo;&lt;/a&gt; in the own words of the 
company's
+    CTO,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>of</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on what people are listening</strong></del></span> <span 
class="inserted"><ins><em>company's
-    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In addition, it may
-    be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app
+      &lt;a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections</strong></del></span> <span 
class="inserted"><ins><em>this data is sold to third parties. This is in 
return</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;better service&rdquo; (meaning more 
intrusive ads?)</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
-    advertisements.&lt;/p&gt;
-       &lt;/li&gt;
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take</strong></del></span> 
<span class="inserted"><ins><em>make this spying acceptable,</em></ins></span> 
according to <span class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>him,
+    is that it</em></ins></span> is <span 
class="inserted"><ins><em>opt-in</em></ins></span> in <span 
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
 
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>make this spying acceptable, 
according</em></ins></span> to <span class="removed"><del><strong>do lots of 
surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access</strong></del></span> <span 
class="inserted"><ins><em>him,
-    is that</em></ins></span> it <span class="removed"><del><strong>demands to 
personal data</strong></del></span> <span class="inserted"><ins><em>is 
opt-in</em></ins></span> in <span class="inserted"><ins><em>newer models. But 
since</em></ins></span> the <span class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across</strong></del></span> <span class="inserted"><ins><em>Vizio 
software is
+    nonfree, we don't know what is actually happening behind</em></ins></span> 
the <span class="removed"><del><strong>wire to Facebook's 
servers</strong></del></span> <span 
class="inserted"><ins><em>scenes,</em></ins></span>
+    and <span class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>there is no guarantee that all future updates will 
leave the
+    settings unchanged.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;If <span class="removed"><del><strong>so, none of Facebook users' 
pictures are private
+      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>you already own a Vizio smart TV (or any smart TV, 
for that
+    matter),</em></ins></span> the <span class="removed"><del><strong>user 
didn't &ldquo;upload&rdquo; them</strong></del></span> <span 
class="inserted"><ins><em>easiest way to make sure it isn't spying on you 
is</em></ins></span>
+    to <span class="inserted"><ins><em>disconnect it from</em></ins></span> 
the <span class="removed"><del><strong>service.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
-        pre-install on some of its phones. The app</strong></del></span> <span 
class="inserted"><ins><em>all future updates</em></ins></span> will <span 
class="removed"><del><strong>give Verizon the same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>leave</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, 
for</em></ins></span> that <span class="removed"><del><strong>Google normally 
gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span>
-    <span class="inserted"><ins><em>matter),</em></ins></span> the <span 
class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>easiest way to make sure it isn't 
spying</em></ins></span> on <span class="removed"><del><strong>only one 
phone&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>you is
-    to disconnect it from the Internet, and use a terrestrial antenna
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based on proprietary malware (DRM</strong></del></span> <span 
class="inserted"><ins><em>Internet,</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software),</em></ins></span> 
and <span class="inserted"><ins><em>set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
+    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>get 
your own router (which can
+    be an old computer running completely free software),</em></ins></span> 
and <span class="removed"><del><strong>some
+      are starting</strong></del></span> <span class="inserted"><ins><em>set 
up a
+    firewall</em></ins></span> to <span class="removed"><del><strong>realize 
that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the</strong></del></span> <span 
class="inserted"><ins><em>block connections to Vizio's servers. Or, as a last 
resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>article for the 
facts it presents. It
-    is too bad that</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>article finishes by 
advocating</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span>
-    <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span 
class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as</strong></del></span> 
<span class="inserted"><ins><em>install</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example of
+      the attitude of</strong></del></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing</strong></del></span> <span 
class="inserted"><ins><em>surrendering to Netflix. The 
Netflix</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>article</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
+    apps</strong></del></span> the <span class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It</em></ins></span>
+    is <span class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as</strong></del></span> <span 
class="inserted"><ins><em>too</em></ins></span> bad <span 
class="removed"><del><strong>as what</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can</strong></del></span>
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>article finishes 
by advocating the
+    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed</em></ins></span> on <span 
class="removed"><del><strong>many sorts of data in the 
phone,</strong></del></span> <span 
class="inserted"><ins><em>them,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    report everything that is viewed</em></ins></span> on <span 
class="inserted"><ins><em>them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>in addition to</strong></del></span> <span 
class="inserted"><ins><em>coming from</em></ins></span> the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>user's own computer,</em></ins></span>
+    the <span class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>TV reports what it is. 
The existence of a way to disable</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span>
+    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was</em></ins></span> in <span class="inserted"><ins><em>these TVs,
+    does not legitimize</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span> <span 
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span>
-    <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>image is 
coming from</em></ins></span> the user's <span 
class="removed"><del><strong>consent&rdquo;
-        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>own computer,
-    the TV reports what it is. The existence of</em></ins></span> a <span 
class="removed"><del><strong>protection against massive</strong></del></span> 
<span class="inserted"><ins><em>way to disable the
-    surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the</em></ins></span> surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
-    sounds to be picked up by proprietary malware running</em></ins></span>
-    on <span class="removed"><del><strong>various sites 
-      such</strong></del></span> <span class="inserted"><ins><em>other devices 
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that 
they
+  &lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to</em></ins></span> be <span 
class="removed"><del><strong>distracted</strong></del></span> <span 
class="inserted"><ins><em>picked up</em></ins></span> by <span 
class="removed"><del><strong>the question of whether the app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>proprietary 
malware running
+    on other devices in range so as</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
+    your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
-    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who</strong></del></span>
-    <span class="inserted"><ins><em>across devices.&lt;/p&gt;
+    manufacturers in spying on their users: their</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
+      &lt;p&gt;The FTC criticized this app because it asked the user to
+      approve sending personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers can track you
+    across devices.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    &lt;p&gt;It is possible</em></ins></span> to <span 
class="removed"><del><strong>the app developer</strong></del></span> <span 
class="inserted"><ins><em>turn this off,</em></ins></span> but <span 
class="removed"><del><strong>did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>having</em></ins></span> it <span 
class="inserted"><ins><em>enabled by default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
-    to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures</strong></del></span> 
<span class="inserted"><ins><em>company
-    already monitors. Tivo customers</em></ins></span> are <span 
class="removed"><del><strong>private
-      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>unaware 
they're
-    being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing 
all</em></ins></span>
-    users <span class="removed"><del><strong>submit</strong></del></span> to 
<span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>new 
combined surveillance by default.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people</em></ins></span> are <span 
class="removed"><del><strong>starting to realize that</strong></del></span> 
<span class="inserted"><ins><em>watching&lt;/a&gt;, even if</em></ins></span> 
it <span class="removed"><del><strong>is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>isn't</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps the user has
-    installed.</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span> 
what <span class="removed"><del><strong>the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they wanted 
to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
-    used <span class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps</strong></del></span> <span 
class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to make its 
TVs</em></ins></span> snoop on <span class="removed"><del><strong>the 
user&lt;/a&gt;. This is in addition to
-      the snooping done by the phone company, and perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get</strong></del></span> <span 
class="inserted"><ins><em>what</em></ins></span>
-    users <span class="removed"><del><strong>to say &ldquo;I agree&rdquo;. 
That is no excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized this app 
because it asked</strong></del></span> <span class="inserted"><ins><em>Samsung 
&ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>internet</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>give</em></ins></span> it to <span 
class="removed"><del><strong>other companies.  This shows</strong></del></span> 
the
-      <span class="removed"><del><strong>weakness of the 
reject-it-if-you-dislike-snooping
+    to <span class="removed"><del><strong>other companies.  This 
shows</strong></del></span> the
+      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>600 millions social media 
profiles</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
       &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>US or some
-    other government.&lt;/p&gt;
-
-    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A</strong></del></span> <span 
class="inserted"><ins><em>be trusted unless it is done by</em></ins></span> free
-    software <span class="removed"><del><strong>flashlight
+      app send any</strong></del></span> <span 
class="inserted"><ins><em>company
+    already monitors. Tivo customers are unaware they're
+    being watched by advertisers. By combining TV viewing</em></ins></span>
+    information <span class="removed"><del><strong>to anyone?  A free software 
flashlight
       app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2146,214 +2129,226 @@
 &lt;ul&gt;
 
   &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</strong></del></span> 
<span class="inserted"><ins><em>with online social media participation, Tivo 
can now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance by default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based</strong></del></span> in <span 
class="removed"><del><strong>the U.S.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>toys My Friend Cayla</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize</em></ins></span> and <span 
class="removed"><del><strong>i-Que transmit</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>your own computer.&lt;/p&gt;
+      can remotely control the toys with</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
+      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>listen in 
on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
-    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops</em></ins></span> on <span class="removed"><del><strong>a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>what programs 
people watch,</em></ins></span> and even <span 
class="removed"><del><strong>speak
+      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;A computerized vibrator</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;</em></ins></span>
-    snooping <span class="removed"><del><strong>on its users 
through</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make</em></ins></span> its <span 
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
+    users <span class="removed"><del><strong>through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201502090"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung 
&ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    other government.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>app</strong></del></span> 
<span class="inserted"><ins><em>report</em></ins></span> was <span 
class="removed"><del><strong>reporting the temperature</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't 
expect this has got
-    better.&lt;/p&gt;
+    &lt;p&gt;Speech recognition is not to be trusted unless</em></ins></span> 
it <span class="removed"><del><strong>was surrounded</strong></del></span> 
<span class="inserted"><ins><em>is done</em></ins></span> by <span 
class="removed"><del><strong>a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data are totally inadequate.
-    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the 
<span class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than</strong></del></span> free
+    software <span class="removed"><del><strong>which users could have
+      checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>TV will not
-    work.&rdquo;&lt;/p&gt;
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>in your own computer.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>make statements about
-      their products, rather than free software which users could have
-      checked and changed.&lt;/p&gt;
+    &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive information will be transmitted to third
+    parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
     
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span> 
the <span class="removed"><del><strong>vibrator</strong></del></span>
-    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
+  &lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
+  &lt;li id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report</em></ins></span> was <span 
class="removed"><del><strong>sued for collecting lots</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
        people used it&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
-    no effect&lt;/a&gt;.  (The fact</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span 
class="inserted"><ins><em>transmission reports a 404 error
-    really means nothing; the server could save that</em></ins></span> data 
<span class="removed"><del><strong>may be
-      true, but</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
+    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
+    better.&lt;/p&gt;
 
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products to get users' formal
+    consent before collecting personal</em></ins></span> data <span 
class="removed"><del><strong>may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>are totally inadequate.
+    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>a
+      data broker,</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>data broker</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it had <span 
class="removed"><del><strong>sold the data to</strong></del></span> <span 
class="inserted"><ins><em>installed</em></ins></span> a
-      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span 
class="inserted"><ins><em>patch</em></ins></span> to <span 
class="removed"><del><strong>figure out
-      who the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
-    product could spy</em></ins></span> this <span 
class="removed"><del><strong>lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
-
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>have been able</strong></del></span> <span 
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to 
<span class="removed"><del><strong>figure out
+      who</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the
+    user <span class="removed"><del><strong>was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
-    &lt;p id="break-security-smarttv"&gt;&lt;a
-    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers</em></ins></span> found a way to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected by</strong></del></span> <span class="inserted"><ins><em>user 
watches, and</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
+    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>switch 
to turn this off has
+    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
+    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>server</em></ins></span> could <span 
class="removed"><del><strong>listen to these conversations
       was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span> <span class="inserted"><ins><em>break 
security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
-    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
-
+&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span <span class="removed"><del><strong>class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture</em></ins></span> to <span 
class="removed"><del><strong>report its location</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
-    long-term.&lt;/p&gt;
-
-    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by, the user's front door.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on how Ring used</em></ins></span> to <span 
class="removed"><del><strong>someone else and</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look
-    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="removed"><del><strong>transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
+      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location to someone else and to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
-    name!&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
+      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>save</em></ins></span> that <span 
class="removed"><del><strong>connects to an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is</strong></del></span> <span 
class="inserted"><ins><em>data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site</strong></del></span> <span 
class="inserted"><ins><em>look at what's</em></ins></span> in <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Even worse, it &lt;a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>back door,</strong></del></span> <span 
class="inserted"><ins><em>patch to stop this,</em></ins></span> but <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>any
+    product</em></ins></span> could <span class="removed"><del><strong>be a
+      misunderstanding.  However, it is certainly surveillance, at
+      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spy this way.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201511250"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>article says 
this</strong></del></span> <span class="inserted"><ins><em>Nest Cam 
&ldquo;smart&rdquo; camera</em></ins></span> is <span 
class="removed"><del><strong>a back door, but that could be a
-      misunderstanding.  However,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches</em></ins></span> it <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</em></ins></span> is <span class="removed"><del><strong>certainly 
surveillance, at
-      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>using it
-    to outsmart you.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-&lt;/ul&gt;
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
+    &lt;p id="break-security-smarttv"&gt;&lt;a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;&lt;p&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product 
as shipped doesn't act as</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+Note</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>to let 
individual employees look
+    at the videos freely.  It appears Amazon has tried to prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>&ldquo;clean&rdquo; 
Windows install is</strong></del></span> <span class="inserted"><ins><em>better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise</em></ins></span> not <span 
class="removed"><del><strong>really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
+puts</strong></del></span> <span class="inserted"><ins><em>to look at 
what's</em></ins></span> in <span class="removed"><del><strong>its own 
malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>place new items 
on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>the videos. That's not
+    security for your home. Security means making</em></ins></span> sure <span 
class="inserted"><ins><em>they don't get</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2363,73 +2358,94 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>the code 
could surely convert it
-    into one.&lt;/p&gt;
+        Shows</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+  &lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511250"&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
       &lt;p&gt;Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>to outsmart 
you.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;/div&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert it
+    into one.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201703140"&gt;
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>was surrounded by a person's
+    minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
+    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>statements about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>vibrator &lt;a
+    &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>personal information about how people
+    was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing the data may be
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
     true, but it doesn't really matter. If it had sold the data to a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
     the company has been ordered to pay a total of 
C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
@@ -2454,44 +2470,43 @@
       is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing</strong></del></span>
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span>
+    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>fact
+      that</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>device is tethered to a server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates that</strong></del></span>
     <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span class="removed"><del><strong>fact
-      that</strong></del></span> <span class="inserted"><ins><em>manufacturer 
and</em></ins></span> the <span class="removed"><del><strong>device is 
tethered</strong></del></span> <span class="inserted"><ins><em>FBI could listen 
to these
-    conversations was unacceptable by itself.&lt;/p&gt;
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span 
class="removed"><del><strong>company
+      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;,</em></ins></span> a <span 
class="removed"><del><strong>server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it</strong></del></span> <span 
class="inserted"><ins><em>speech recognition
-    company based in the U.S.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-    &lt;p&gt;Those toys</em></ins></span> also <span 
class="removed"><del><strong>demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak 
into</em></ins></span> the <span class="removed"><del><strong>company
-      surveillance capability.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>Nest 
Cam</strong></del></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy 
on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2504,24 +2519,25 @@
 <span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
     and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span 
class="removed"><del><strong>e-readers&mdash;not only the
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
       Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
       they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
       send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+      needed</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using a DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>snoop on 
other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2539,30 +2555,52 @@
   &lt;/li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
   effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
-    voice assistants</em></ins></span> do <span 
class="removed"><del><strong>because the system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>similar things.&lt;/p&gt;
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
+    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
+    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
+    even if <span class="removed"><del><strong>it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon</em></ins></span> has <span 
class="removed"><del><strong>no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
+    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff</em></ins></span> even <span 
class="removed"><del><strong>if it asked for
-    authentication, you couldn't be confident that 
Nissan</strong></del></span> has <span class="removed"><del><strong>no
-    access.  The software in the car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Even if no one connects</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees</em></ins></span> to <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>cell phone
     modem enables</strong></del></span> <span class="inserted"><ins><em>client 
program is nonfree, and data processing is done
     &ldquo;&lt;a 
href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in</em></ins></span>
     the <span class="removed"><del><strong>phone company</strong></del></span> 
<span class="inserted"><ins><em>cloud&lt;/a&gt;&rdquo; (a soothing way of 
saying &ldquo;We won't
@@ -3415,7 +3453,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/10 17:02:55 $
+$Date: 2019/05/29 06:00:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary-surveillance.de.po      10 May 2019 17:02:55 -0000      1.287
+++ proprietary-surveillance.de.po      29 May 2019 06:00:57 -0000      1.288
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -3985,6 +3985,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.427
retrieving revision 1.428
diff -u -b -r1.427 -r1.428
--- proprietary-surveillance.fr.po      10 May 2019 17:59:15 -0000      1.427
+++ proprietary-surveillance.fr.po      29 May 2019 06:00:57 -0000      1.428
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2019-05-10 19:58+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3395,6 +3396,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary-surveillance.it-diff.html       10 May 2019 17:02:55 -0000      
1.139
+++ proprietary-surveillance.it-diff.html       29 May 2019 06:00:57 -0000      
1.140
@@ -1423,23 +1423,8 @@
     &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>side issue. What 
the company does
     with the data</em></ins></span> is <span class="removed"><del><strong>not 
really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>a secondary issue. The principal wrong here is that
-    the company gets that data</em></ins></span> at <span 
class="removed"><del><strong>Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
+puts</strong></del></span> <span class="inserted"><ins><em>a secondary issue. 
The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
@@ -1448,80 +1433,33 @@
   &lt;/li&gt;
 
   &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span class="removed"><del><strong>emails 
of members of Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span> <span 
class="inserted"><ins><em>send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>obtains from the same machine via
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the app; others only say that the user is
+    the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    account.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span> 
<span class="inserted"><ins><em>Android</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location</em></ins></span> even when <span 
class="inserted"><ins><em>users disable &ldquo;location
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>other 
kinds of location
+    &lt;p&gt;There are other ways to turn off the other kinds of location
     tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2098,7 +2036,7 @@
     &lt;p&gt;Vizio goes a step further than other TV
     manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    &ldquo;smart&rdquo; TVs analyze your viewing habits</em></ins></span> in 
<span class="inserted"><ins><em>detail and
     link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
@@ -2133,7 +2071,7 @@
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    used a firmware &ldquo;upgrade&rdquo; to make</em></ins></span> its <span 
class="inserted"><ins><em>TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2145,7 +2083,12 @@
     other government.&lt;/p&gt;
 
     &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
-    software in your own computer.&lt;/p&gt;
+    software in your</em></ins></span> own <span 
class="removed"><del><strong>malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
@@ -2173,19 +2116,36 @@
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>report 
what the
     user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>user watches, 
and the switch to turn</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it &lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
@@ -2199,85 +2159,72 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a</em></ins></span> 
&ldquo;smart&rdquo; <span class="removed"><del><strong>device means the 
manufacturer is using it</strong></del></span> <span 
class="inserted"><ins><em>TV&lt;/a&gt;
-    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>video</em></ins></span> they <span 
class="removed"><del><strong>report even</strong></del></span> <span 
class="inserted"><ins><em>capture to Amazon 
servers&lt;/a&gt;,</em></ins></span> which <span 
class="removed"><del><strong>page</strong></del></span> <span 
class="inserted"><ins><em>save it
-    long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>video 
shows everyone that comes near, or merely
-    passes by,</em></ins></span> the <span 
class="removed"><del><strong>e-reader</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-    &lt;p&gt;The article focuses on how Ring</em></ins></span> used
-      <span class="removed"><del><strong>by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>let 
individual employees look
-    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>prevent that
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>how Ring used to let individual employees look
+    at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because the system has no authentication when
-    accessed through</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span class="removed"><del><strong>modem.  
However, even if it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; 
would</em></ins></span> be <span 
class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>a better
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>these
-    manufacturers promise not to look at what's</em></ins></span> in the <span 
class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>videos. That's not
-    security for your home. Security</em></ins></span> means <span 
class="removed"><del><strong>it demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>making sure they don't get</em></ins></span> to
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>the videos. 
That's not
+    security for your home. Security means making sure they don't get to
+    see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
@@ -2286,161 +2233,224 @@
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511250"&gt;
+  &lt;li id="M201511250"&gt;</em></ins></span>
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when</em></ins></span> the <span class="removed"><del><strong>car 
remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
-    to <span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
-    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span 
class="removed"><del><strong>is possible</strong></del></span>
-    <span class="inserted"><ins><em>into one.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
+    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert it
+    into one.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span>
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on</em></ins></span> its <span 
class="removed"><del><strong>computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because the system has no authentication when
+    accessed</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>was 
surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements</em></ins></span> 
about <span class="removed"><del><strong>drivers' 
movements&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>their
-    products, rather than free software</em></ins></span> which <span 
class="removed"><del><strong>is made available to car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>users could 
have checked</em></ins></span>
-    and
-      <span 
class="removed"><del><strong>others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span class="removed"><del><strong>case of toll-collection 
systems, mentioned in this article, is not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should</strong></del></span> <span 
class="inserted"><ins><em>personal information about how people
+    standard with which manufacturers would make statements about their
+    products, rather than free</em></ins></span> software <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>which users could have checked
+    and changed.&lt;/p&gt;
+
+    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data 
may</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
-      payment systems,</strong></del></span>
-    <span class="inserted"><ins><em>true,</em></ins></span> but <span 
class="inserted"><ins><em>it doesn't really matter. If it had 
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>data to a data
-    broker,</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
+    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>data 
to a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>data broker would 
have been able</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
     
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the company <span class="inserted"><ins><em>has been ordered to pay a 
total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
+    the <span class="removed"><del><strong>time; it is 
possible</strong></del></span> <span class="inserted"><ins><em>company has been 
ordered</em></ins></span> to <span class="removed"><del><strong>physically 
remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>c.&lt;/a&gt;). The</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>store it.&lt;/p&gt;
+    conversations to Nuance Communications&lt;/a&gt;, a speech 
recognition</em></ins></span>
+    company <span class="removed"><del><strong>says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>get the 
data</strong></del></span> <span class="inserted"><ins><em>listen in on a 
child's speech,</em></ins></span> and <span class="removed"><del><strong>hand 
it over,</strong></del></span> <span class="inserted"><ins><em>even speak 
into</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
-    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Nest thermometers
   send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about</strong></del></span> <span class="inserted"><ins><em>a 
child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
       Rent-to-own computers were programmed</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using a DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips 
made</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt), and sends
+    it</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see 
you</strong></del></span> <span class="inserted"><ins><em>government agencies. 
In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result,</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
     &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul class="blurbs"&gt;
   &lt;li id="M201904240"&gt;
     &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them,</strong></del></span>
@@ -3198,7 +3208,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/10 17:02:55 $
+$Date: 2019/05/29 06:00:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary-surveillance.it.po      10 May 2019 17:02:56 -0000      1.300
+++ proprietary-surveillance.it.po      29 May 2019 06:00:57 -0000      1.301
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -3772,6 +3772,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary-surveillance.ja-diff.html       10 May 2019 17:02:56 -0000      
1.149
+++ proprietary-surveillance.ja-diff.html       29 May 2019 06:00:58 -0000      
1.150
@@ -2416,6 +2416,28 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904240"&gt;
     &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
@@ -3056,7 +3078,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/10 17:02:56 $
+$Date: 2019/05/29 06:00:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- proprietary-surveillance.ja.po      10 May 2019 17:02:56 -0000      1.273
+++ proprietary-surveillance.ja.po      29 May 2019 06:00:58 -0000      1.274
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3183,6 +3183,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary-surveillance.pot        10 May 2019 17:02:56 -0000      1.221
+++ proprietary-surveillance.pot        29 May 2019 06:00:58 -0000      1.222
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2314,6 +2314,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a "
+"href=\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php\";>
 "
+"the data remain on other servers</a>, where they can be accessed by "
+"advertising companies and government agencies. In other words, deleting the "
+"collected information doesn't cancel the wrong of collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips "
+"Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos "
+"speakers are likewise stored longer than necessary on the servers the "
+"devices are tethered to. Moreover, they are made available to Alexa. As a "
+"result, Amazon has a very precise picture of users' life at home, not only "
+"in the present, but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a "
 
"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\";>
 "
 "recorded for Amazon employees to listen to</a>. The Google and Apple voice "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.524
retrieving revision 1.525
diff -u -b -r1.524 -r1.525
--- proprietary-surveillance.ru.po      12 May 2019 09:12:12 -0000      1.524
+++ proprietary-surveillance.ru.po      29 May 2019 06:00:58 -0000      1.525
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3354,6 +3355,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.de-diff.html    18 May 2019 08:29:45 -0000      1.94
+++ proprietary.de-diff.html    29 May 2019 06:00:58 -0000      1.95
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -126,17 +126,17 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -186,6 +186,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905150"&gt;
     &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
@@ -231,25 +253,6 @@
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
-    voice assistants do similar things.&lt;/p&gt;
-
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
-    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
-    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
-    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +313,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary.de.po   18 May 2019 08:29:45 -0000      1.136
+++ proprietary.de.po   29 May 2019 06:00:58 -0000      1.137
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -439,6 +439,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "
@@ -498,32 +522,6 @@
 "aluminum foil?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
-"it's done&rdquo;), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary.es.po   19 May 2019 09:37:47 -0000      1.166
+++ proprietary.es.po   29 May 2019 06:00:58 -0000      1.167
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -303,6 +304,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "
@@ -394,46 +419,6 @@
 "desconectando el módem del celular o envolviendo la antena con papel de "
 "aluminio?"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-"Algunas de las órdenes del usuario al servicio Alexa son <a href=\"https://";
-"www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
-"someone-is-20190411-p51d4g.html\">grabadas por empleados de Amazon para su "
-"escucha</a>. Los asistentes de voz de Google y Apple hacen cosas similares."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-"Una parte del personal encargado de Alexa tiene acceso incluso a <a href="
-"\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-";
-"home-addresses-1.1248788\">la localización y otros datos personales</a>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
-"it's done&rdquo;), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-"Dado que el programa cliente no es libre, y que el procesamiento de los "
-"datos se hace «<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">en 
"
-"la nube</a>» (una expresión tranquilizadora que significa: «No te diremos "
-"cómo ni dónde se hace»), los usuarios no tienen forma de saber qué sucede 
"
-"con las grabaciones a menos que algún empleado <a href=\"https://www.";
-"bnnbloomberg.ca/three-cheers-for-amazon-s-human-"
-"eavesdroppers-1.1243033\">rompa sus acuerdos de confidencialidad</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,6 +498,46 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Some of users' commands to the Alexa service are <a href=\"https://www.";
+#~ "smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+#~ "someone-is-20190411-p51d4g.html\"> recorded for Amazon employees to "
+#~ "listen to</a>. The Google and Apple voice assistants do similar things."
+#~ msgstr ""
+#~ "Algunas de las órdenes del usuario al servicio Alexa son <a href="
+#~ "\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-";
+#~ "sometimes-someone-is-20190411-p51d4g.html\">grabadas por empleados de "
+#~ "Amazon para su escucha</a>. Los asistentes de voz de Google y Apple hacen "
+#~ "cosas similares."
+
+#~ msgid ""
+#~ "A fraction of the Alexa service staff even has access to <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-";
+#~ "customers-home-addresses-1.1248788\"> location and other personal data</"
+#~ "a>."
+#~ msgstr ""
+#~ "Una parte del personal encargado de Alexa tiene acceso incluso a <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-";
+#~ "customers-home-addresses-1.1248788\">la localización y otros datos "
+#~ "personales</a>"
+
+#~ msgid ""
+#~ "Since the client program is nonfree, and data processing is done &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+#~ "a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and "
+#~ "where it's done&rdquo;), users have no way to know what happens to the "
+#~ "recordings unless human eavesdroppers <a href=\"https://www.bnnbloomberg.";
+#~ "ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their "
+#~ "non-disclosure agreements</a>."
+#~ msgstr ""
+#~ "Dado que el programa cliente no es libre, y que el procesamiento de los "
+#~ "datos se hace «<a href=\"/philosophy/words-to-avoid.html#CloudComputing"
+#~ "\">en la nube</a>» (una expresión tranquilizadora que significa: «No te 
"
+#~ "diremos cómo ni dónde se hace»), los usuarios no tienen forma de saber "
+#~ "qué sucede con las grabaciones a menos que algún empleado <a href="
+#~ "\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-";
+#~ "eavesdroppers-1.1243033\">rompa sus acuerdos de confidencialidad</a>."
+
+#~ msgid ""
 #~ "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 #~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
 #~ "risk/\">no longer possible to disable an unscrupulous tracking anti-"

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary.fr.po   18 May 2019 12:25:57 -0000      1.205
+++ proprietary.fr.po   29 May 2019 06:00:58 -0000      1.206
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2019-05-18 14:23+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -299,6 +300,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "
@@ -389,48 +414,6 @@
 "connexion en débranchant le modem, ou bien en enveloppant l'antenne dans du "
 "papier d'aluminium?"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-"Certaines commandes envoyées par l'utilisateur au service Alexa sont <a 
href="
-"\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-";
-"sometimes-someone-is-20190411-p51d4g.html\">enregistrées pour que les "
-"employés d'Amazon puissent les écouter</a>. Les assistants vocaux de Google 
"
-"et Apple font à peu près la même chose."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-"Une partie du personnel d'Alexa a même accès à la <a href=\"https://www.";
-"bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\">géolocalisation et autres données personnelles</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
-"it's done&rdquo;), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-"Puisque le programme client n'est pas libre et que le traitement des données 
"
-"se fait « <a href=\"/philosophy/words-to-avoid.html#CloudComputing\">dans 
le "
-"nuage</a> » (une expression rassurante signifiant « On ne veut pas vous 
dire "
-"où et comment cela se fait »), les utilisateurs n'ont aucun moyen de 
savoir "
-"ce qui arrive aux enregistrements, sauf si l'un des humains indiscrets <a "
-"href=\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-";
-"eavesdroppers-1.1243033\">rompt l'accord de confidentialité</a> qu'il a "
-"signé."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -504,3 +487,43 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Some of users' commands to the Alexa service are <a href=\"https://www.";
+#~ "smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+#~ "someone-is-20190411-p51d4g.html\"> recorded for Amazon employees to "
+#~ "listen to</a>. The Google and Apple voice assistants do similar things."
+#~ msgstr ""
+#~ "Certaines commandes envoyées par l'utilisateur au service Alexa sont <a "
+#~ "href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-";
+#~ "to-us-sometimes-someone-is-20190411-p51d4g.html\">enregistrées pour que "
+#~ "les employés d'Amazon puissent les écouter</a>. Les assistants vocaux de 
"
+#~ "Google et Apple font à peu près la même chose."
+
+#~ msgid ""
+#~ "A fraction of the Alexa service staff even has access to <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-";
+#~ "customers-home-addresses-1.1248788\"> location and other personal data</"
+#~ "a>."
+#~ msgstr ""
+#~ "Une partie du personnel d'Alexa a même accès à la <a 
href=\"https://www.";
+#~ "bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+#~ "addresses-1.1248788\">géolocalisation et autres données 
personnelles</a>."
+
+#~ msgid ""
+#~ "Since the client program is nonfree, and data processing is done &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+#~ "a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and "
+#~ "where it's done&rdquo;), users have no way to know what happens to the "
+#~ "recordings unless human eavesdroppers <a href=\"https://www.bnnbloomberg.";
+#~ "ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their "
+#~ "non-disclosure agreements</a>."
+#~ msgstr ""
+#~ "Puisque le programme client n'est pas libre et que le traitement des "
+#~ "données se fait « <a 
href=\"/philosophy/words-to-avoid.html#CloudComputing"
+#~ "\">dans le nuage</a> » (une expression rassurante signifiant « On ne 
veut "
+#~ "pas vous dire où et comment cela se fait »), les utilisateurs n'ont 
aucun "
+#~ "moyen de savoir ce qui arrive aux enregistrements, sauf si l'un des "
+#~ "humains indiscrets <a href=\"https://www.bnnbloomberg.ca/three-cheers-for-";
+#~ "amazon-s-human-eavesdroppers-1.1243033\">rompt l'accord de "
+#~ "confidentialité</a> qu'il a signé."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.it-diff.html    18 May 2019 08:29:45 -0000      1.106
+++ proprietary.it-diff.html    29 May 2019 06:00:58 -0000      1.107
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -185,6 +185,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905150"&gt;
     &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
@@ -230,25 +252,6 @@
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
-    voice assistants do similar things.&lt;/p&gt;
-
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
-    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
-    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
-    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -309,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.it.po   18 May 2019 08:29:45 -0000      1.145
+++ proprietary.it.po   29 May 2019 06:00:58 -0000      1.146
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "
@@ -502,32 +526,6 @@
 "aluminum foil?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
-"it's done&rdquo;), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary.ja-diff.html    18 May 2019 08:29:45 -0000      1.107
+++ proprietary.ja-diff.html    29 May 2019 06:00:58 -0000      1.108
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -182,6 +182,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905150"&gt;
     &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
@@ -227,25 +249,6 @@
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
-    voice assistants do similar things.&lt;/p&gt;
-
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
-    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
-    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
-    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -306,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary.ja.po   18 May 2019 08:29:45 -0000      1.128
+++ proprietary.ja.po   29 May 2019 06:00:58 -0000      1.129
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -361,6 +361,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "
@@ -420,32 +444,6 @@
 "aluminum foil?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
-"it's done&rdquo;), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.nl-diff.html    18 May 2019 08:29:45 -0000      1.106
+++ proprietary.nl-diff.html    29 May 2019 06:00:58 -0000      1.107
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -185,6 +185,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905150"&gt;
     &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
@@ -230,25 +252,6 @@
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
-    voice assistants do similar things.&lt;/p&gt;
-
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
-    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
-    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
-    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -309,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary.nl.po   18 May 2019 08:29:45 -0000      1.117
+++ proprietary.nl.po   29 May 2019 06:00:58 -0000      1.118
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "
@@ -495,32 +519,6 @@
 "aluminum foil?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
-"it's done&rdquo;), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.pl-diff.html    18 May 2019 08:29:45 -0000      1.124
+++ proprietary.pl-diff.html    29 May 2019 06:00:58 -0000      1.125
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -129,9 +129,9 @@
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -183,6 +183,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905150"&gt;
     &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
@@ -228,25 +250,6 @@
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
-    voice assistants do similar things.&lt;/p&gt;
-
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
-    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
-    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
-    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -307,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary.pl.po   18 May 2019 08:29:45 -0000      1.112
+++ proprietary.pl.po   29 May 2019 06:00:58 -0000      1.113
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "
@@ -578,32 +602,6 @@
 "aluminum foil?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
-"it's done&rdquo;), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.pot     18 May 2019 08:29:45 -0000      1.109
+++ proprietary.pot     29 May 2019 06:00:58 -0000      1.110
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a "
+"href=\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php\";>
 "
+"the data remain on other servers</a>, where they can be accessed by "
+"advertising companies and government agencies. In other words, deleting the "
+"collected information doesn't cancel the wrong of collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips "
+"Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos "
+"speakers are likewise stored longer than necessary on the servers the "
+"devices are tethered to. Moreover, they are made available to Alexa. As a "
+"result, Amazon has a very precise picture of users' life at home, not only "
+"in the present, but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a "
 "href=\"https://boingboing.net/2019/05/15/brittle-security.html\";> sitting "
 "ducks for other attackers</a>, and the app censorship prevents security "
@@ -307,32 +330,6 @@
 "aluminum foil?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a "
-"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\";>
 "
-"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
-"assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a "
-"href=\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788\";>
 "
-"location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the "
-"cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and "
-"where it's done&rdquo;), users have no way to know what happens to the "
-"recordings unless human eavesdroppers <a "
-"href=\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\";>
 "
-"break their non-disclosure agreements</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary.pt-br.po        21 May 2019 12:00:19 -0000      1.168
+++ proprietary.pt-br.po        29 May 2019 06:00:58 -0000      1.169
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2019-05-20 00:20-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -296,6 +297,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "
@@ -385,47 +410,6 @@
 "Se você possui um desses carros, conseguiu quebrar a conectividade "
 "desconectando o modem celular ou envolvendo a antena em papel alumínio?"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-"Alguns dos comandos dos usuários para o serviço Alexa são <a 
href=\"https://";
-"www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
-"someone-is-20190411-p51d4g.html\"> gravados para que os funcionários da "
-"Amazon ouçam</a>. Os assistentes de voz do Google e da Apple fazem coisas "
-"semelhantes."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-"Uma fração da equipe de atendimento do Alexa tem acesso a <a 
href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> locais e outros dados pessoais</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
-"it's done&rdquo;), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-"Como o programa cliente não é livre, e o processamento de dados é feito 
“<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">na nuvem</a>” (uma "
-"maneira tranquilizadora de dizer “não vamos lhe dizer como e onde é 
feito”), "
-"os usuários não têm como saber o que acontece com as gravações, a menos 
que "
-"espiões humanos <a href=\"https://www.bnnbloomberg.ca/three-cheers-for-";
-"amazon-s-human-eavesdroppers-1.1243033\"> quebrem seus acordos de não "
-"divulgação</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -501,6 +485,45 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "Some of users' commands to the Alexa service are <a href=\"https://www.";
+#~ "smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+#~ "someone-is-20190411-p51d4g.html\"> recorded for Amazon employees to "
+#~ "listen to</a>. The Google and Apple voice assistants do similar things."
+#~ msgstr ""
+#~ "Alguns dos comandos dos usuários para o serviço Alexa são <a href="
+#~ "\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-";
+#~ "sometimes-someone-is-20190411-p51d4g.html\"> gravados para que os "
+#~ "funcionários da Amazon ouçam</a>. Os assistentes de voz do Google e da "
+#~ "Apple fazem coisas semelhantes."
+
+#~ msgid ""
+#~ "A fraction of the Alexa service staff even has access to <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-";
+#~ "customers-home-addresses-1.1248788\"> location and other personal data</"
+#~ "a>."
+#~ msgstr ""
+#~ "Uma fração da equipe de atendimento do Alexa tem acesso a <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-";
+#~ "customers-home-addresses-1.1248788\"> locais e outros dados pessoais</a>."
+
+#~ msgid ""
+#~ "Since the client program is nonfree, and data processing is done &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+#~ "a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and "
+#~ "where it's done&rdquo;), users have no way to know what happens to the "
+#~ "recordings unless human eavesdroppers <a href=\"https://www.bnnbloomberg.";
+#~ "ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their "
+#~ "non-disclosure agreements</a>."
+#~ msgstr ""
+#~ "Como o programa cliente não é livre, e o processamento de dados é feito 
"
+#~ "“<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">na nuvem</"
+#~ "a>” (uma maneira tranquilizadora de dizer “não vamos lhe dizer como e 
"
+#~ "onde é feito”), os usuários não têm como saber o que acontece com as 
"
+#~ "gravações, a menos que espiões humanos <a 
href=\"https://www.bnnbloomberg.";
+#~ "ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> quebrem "
+#~ "seus acordos de não divulgação</a>."
+
+#~ msgid ""
 #~ "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 #~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
 #~ "risk/\">no longer possible to disable an unscrupulous tracking anti-"

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.242
retrieving revision 1.243
diff -u -b -r1.242 -r1.243
--- proprietary.ru.po   18 May 2019 08:59:41 -0000      1.242
+++ proprietary.ru.po   29 May 2019 06:00:58 -0000      1.243
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "
@@ -392,46 +417,6 @@
 "Если вы владеете одним из этих 
автомобилей, удалось ли вам разорвать "
 "соединение, отключив сотовый модем или 
обернов антенну в фольгу?"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-"Некоторые из пользовательских команд 
службы Alexa <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> записывались для 
подслушивания работниками "
-"Amazon</a>. Подобное делает и голосовая 
поддержка Google и Apple."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-"Часть сотрудников службы Alexa даже имеет 
доступ к <a href=\"https://www.";
-"bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> местоположению и 
персональным данным</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
-"it's done&rdquo;), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-"Поскольку программа-клиент несвободна, а 
обработка данных проходит &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">в 
облаке</a>&rdquo; "
-"(так они мягко говорят &ldquo;мы вам не 
расскажем, как и где это "
-"делается&rdquo;), пользователи не могут 
узнать, что происходит с записями, "
-"если только люди, которые подслушивают, не 
<a href=\"https://www.";
-"bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> "
-"нарушат свой договор о неразглашении</a>."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -511,6 +496,45 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Some of users' commands to the Alexa service are <a href=\"https://www.";
+#~ "smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+#~ "someone-is-20190411-p51d4g.html\"> recorded for Amazon employees to "
+#~ "listen to</a>. The Google and Apple voice assistants do similar things."
+#~ msgstr ""
+#~ "Некоторые из пользовательских команд 
службы Alexa <a href=\"https://www.";
+#~ "smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+#~ "someone-is-20190411-p51d4g.html\"> записывались для 
подслушивания "
+#~ "работниками Amazon</a>. Подобное делает и 
голосовая поддержка Google и "
+#~ "Apple."
+
+#~ msgid ""
+#~ "A fraction of the Alexa service staff even has access to <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-";
+#~ "customers-home-addresses-1.1248788\"> location and other personal data</"
+#~ "a>."
+#~ msgstr ""
+#~ "Часть сотрудников службы Alexa даже имеет 
доступ к <a href=\"https://www.";
+#~ "bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+#~ "addresses-1.1248788\"> местоположению и 
персональным данным</a>."
+
+#~ msgid ""
+#~ "Since the client program is nonfree, and data processing is done &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+#~ "a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and "
+#~ "where it's done&rdquo;), users have no way to know what happens to the "
+#~ "recordings unless human eavesdroppers <a href=\"https://www.bnnbloomberg.";
+#~ "ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their "
+#~ "non-disclosure agreements</a>."
+#~ msgstr ""
+#~ "Поскольку программа-клиент несвободна, 
а обработка данных проходит &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">в 
облаке</"
+#~ "a>&rdquo; (так они мягко говорят &ldquo;мы вам не 
расскажем, как и где "
+#~ "это делается&rdquo;), пользователи не могут 
узнать, что происходит с "
+#~ "записями, если только люди, которые 
подслушивают, не <a href=\"https://";
+#~ "www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-"
+#~ "eavesdroppers-1.1243033\"> нарушат свой договор о 
неразглашении</a>."
+
+#~ msgid ""
 #~ "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 #~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
 #~ "risk/\">no longer possible to disable an unscrupulous tracking anti-"

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary.zh-tw-diff.html 18 May 2019 08:29:45 -0000      1.84
+++ proprietary.zh-tw-diff.html 29 May 2019 06:00:58 -0000      1.85
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -126,17 +126,17 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -186,6 +186,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905150"&gt;
     &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
@@ -231,25 +253,6 @@
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
-    voice assistants do similar things.&lt;/p&gt;
-
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
-    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
-    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
-    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +313,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary.zh-tw.po        18 May 2019 08:29:45 -0000      1.95
+++ proprietary.zh-tw.po        29 May 2019 06:00:59 -0000      1.96
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "
@@ -409,32 +433,6 @@
 "aluminum foil?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://";
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
-"it's done&rdquo;), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- pt-br.po    21 May 2019 12:00:19 -0000      1.116
+++ pt-br.po    29 May 2019 06:01:00 -0000      1.117
@@ -334,6 +334,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- ru.po       28 May 2019 11:03:21 -0000      1.193
+++ ru.po       29 May 2019 06:01:00 -0000      1.194
@@ -424,6 +424,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -982,18 +1006,19 @@
 "a>, and the app censorship prevents security companies from figuring out how "
 "those attacks work."
 msgstr ""
-"Пользователи, пойманные в тьюрму 
ай-чудищ&nbsp;&mdash; <a href=\"https://boingboing.";
-"net/2019/05/15/brittle-security.html\"> подсадные утки для 
других злоумышленников</a>, "
-"а цензура приложений не позволяет 
компаниям по безопасности выяснять, как "
-"они взламывают устройства."
+"Пользователи, пойманные в тьюрму 
ай-чудищ&nbsp;&mdash; <a href=\"https://";
+"boingboing.net/2019/05/15/brittle-security.html\"> подсадные 
утки для других "
+"злоумышленников</a>, а цензура приложений 
не позволяет компаниям по "
+"безопасности выяснять, как они взламывают 
устройства."
 
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
 "even if it didn't lead to security threats as well."
 msgstr ""
-"Цензура приложений со стороны Apple 
несправедлива в принципе, и это нельзя было 
бы "
-"извинить, даже если из-за этого не 
возникали бы еще и угрозы безопасности."
+"Цензура приложений со стороны Apple 
несправедлива в принципе, и это нельзя "
+"было бы извинить, даже если из-за этого не 
возникали бы еще и угрозы "
+"безопасности."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- zh-tw.po    18 May 2019 08:29:46 -0000      1.88
+++ zh-tw.po    29 May 2019 06:01:00 -0000      1.89
@@ -334,6 +334,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
 "com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]