www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Fri, 7 Jun 2019 04:33:56 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/06/07 04:33:55

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.ru.po nl.po 
                         pl.po pot proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.437&r2=1.438
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.304&r2=1.305
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.531&r2=1.532
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.210&r2=1.211
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.92&r2=1.93

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- de.po       2 Jun 2019 17:01:05 -0000       1.93
+++ de.po       7 Jun 2019 08:33:52 -0000       1.94
@@ -1720,6 +1720,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- es.po       3 Jun 2019 09:02:55 -0000       1.125
+++ es.po       7 Jun 2019 08:33:52 -0000       1.126
@@ -1509,6 +1509,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- fr.po       2 Jun 2019 17:32:44 -0000       1.161
+++ fr.po       7 Jun 2019 08:33:52 -0000       1.162
@@ -1466,6 +1466,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- it.po       2 Jun 2019 17:01:05 -0000       1.93
+++ it.po       7 Jun 2019 08:33:52 -0000       1.94
@@ -1705,6 +1705,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- ja.po       2 Jun 2019 17:01:05 -0000       1.92
+++ ja.po       7 Jun 2019 08:33:53 -0000       1.93
@@ -1454,6 +1454,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-apple.de-diff.html  18 May 2019 08:29:44 -0000      1.34
+++ malware-apple.de-diff.html  7 Jun 2019 08:33:53 -0000       1.35
@@ -571,45 +571,54 @@
 
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
 solely to</strong></del></span> <span class="inserted"><ins><em>point 
that</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt; by being designed 
to</strong></del></span> <span class="inserted"><ins><em>should
     not</em></ins></span> be <span class="removed"><del><strong>incompatible 
with all
-other options, ethical</strong></del></span> <span 
class="inserted"><ins><em>allowed to censor apps.  Even if Apple carried out 
this act of
+other options, ethical or unethical.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
+formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means
+of converting them</strong></del></span> <span 
class="inserted"><ins><em>allowed</em></ins></span> to <span 
class="removed"><del><strong>or from Open Document Formats&lt;/a&gt;. iWork 
formats
+have changed several times since they were first introduced. This 
may</strong></del></span> <span class="inserted"><ins><em>censor apps.  Even if 
Apple carried out this act of
     censorship with some care, it would still be wrong.  Whether racism
     is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not have the power to impose its views
-    about either of these questions,</em></ins></span> or <span 
class="removed"><del><strong>unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>any other.&lt;/p&gt;</em></ins></span>
+    the real issue.  Apple should not</em></ins></span> have
+<span class="removed"><del><strong>had</strong></del></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>power to impose its views
+    about either</em></ins></span> of <span 
class="removed"><del><strong>thwarting &lt;a
+href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
+efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
+
+&lt;p&gt;iWork formats are considered &lt;a
+href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
+unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>these questions, or any 
other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
-formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means</strong></del></span>
+&lt;p&gt;In MacOS</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples</em></ins></span> of <span 
class="removed"><del><strong>converting them</strong></del></span> <span 
class="inserted"><ins><em>Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>iOS,</strong></del></span> <span 
class="inserted"><ins><em>inconsistent censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>or from Open Document Formats&lt;/a&gt;. 
iWork formats
-have changed several times since they were first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>iThings for a time.  It also &lt;a
-    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>procedure</strong></del></span> <span 
class="inserted"><ins><em>iThings</em></ins></span> for <span 
class="inserted"><ins><em>a time.  It also</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
+converting images from</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
     killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed the 
locations</em></ins></span>
-    of <span class="removed"><del><strong>thwarting</strong></del></span> 
<span class="inserted"><ins><em>US drone assassinations, giving various 
excuses. Each
+    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>Photos format&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>locations
+    of US drone assassinations, giving various excuses. Each
     time the developers fixed one &ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection, 
Apple</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse
 engineering
-efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
-
-&lt;p&gt;iWork formats</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    complained about another.  After the fifth rejection, Apple &lt;a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
     admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -619,35 +628,28 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo;</em></ins></span> are <span 
class="removed"><del><strong>considered</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
-unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users, or make option settings hard
-    to find&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed to mislead users, or make option settings 
hard</em></ins></span>
+    to <span class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows</em></ins></span> a <span 
class="removed"><del><strong>free format is so tedious
+and time-consuming that</strong></del></span> <span 
class="inserted"><ins><em>company such as Apple to say, &ldquo;We 
allow</em></ins></span> users <span 
class="removed"><del><strong>just</strong></del></span>
+    <span class="inserted"><ins><em>to turn this off&rdquo; while ensuring 
that few will understand how
+    to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;In MacOS and iOS,</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
 
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of</em></ins></span> the <span 
class="removed"><del><strong>procedure for</strong></del></span> <span 
class="inserted"><ins><em>software.  This section reports examples of hard sell 
and other unjust commercial tactics by Apple.&lt;/p&gt;
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
-    &lt;p&gt;Apple Siri</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-converting images from the Photos format&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
-    to <span class="removed"><del><strong>a free format is so tedious
-and time-consuming that users just</strong></del></span> give <span 
class="removed"><del><strong>up</strong></del></span> <span 
class="inserted"><ins><em>you information&lt;/a&gt; about music 
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot 
of them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>you're 
not an Apple
+    &lt;p&gt;Apple Siri &lt;a
+    
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
+    to</em></ins></span> give <span 
class="removed"><del><strong>up</strong></del></span> <span 
class="inserted"><ins><em>you information&lt;/a&gt; about music 
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot 
of them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>you're 
not an Apple
     Music subscriber.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -720,13 +722,13 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains</em></ins></span> DRM <span 
class="removed"><del><strong>that caters</strong></del></span> <span 
class="inserted"><ins><em>specifically designed</em></ins></span> to <span 
class="removed"><del><strong>Bluray disks&lt;/a&gt;.  
(The</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    iPhone 7 contains</em></ins></span> DRM <span 
class="removed"><del><strong>that caters</strong></del></span> <span 
class="inserted"><ins><em>specifically designed</em></ins></span> to <span 
class="removed"><del><strong>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
+  and said that MacOS would do</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>focused on Windows
-  and said that MacOS would do</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>same thing subsequently.)&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;The article uses</em></ins></span> the <span 
class="removed"><del><strong>same thing subsequently.)&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
@@ -784,8 +786,7 @@
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
     deleted from iPods</em></ins></span> the <span 
class="removed"><del><strong>iThing jail:</strong></del></span> <span 
class="inserted"><ins><em>music that</em></ins></span> users <span 
class="removed"><del><strong>can now install apps built</strong></del></span> 
<span class="inserted"><ins><em>had got</em></ins></span> from
 <span class="removed"><del><strong>source code, provided the source code is 
written in Swift.  Users
-cannot do this freely because they are required to identify
-themselves.</strong></del></span> <span class="inserted"><ins><em>internet 
music
+cannot do</strong></del></span> <span class="inserted"><ins><em>internet music
     stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -794,9 +795,9 @@
     
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
     An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
     unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
-    not approved by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All</em></ins></span> this <span 
class="removed"><del><strong>is a crack in</strong></del></span> <span 
class="inserted"><ins><em>was apparently intentional.&lt;/p&gt;
+    not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+    censorship&lt;/a&gt;.  All</em></ins></span> this <span 
class="removed"><del><strong>freely because they are required to identify
+themselves.</strong></del></span> <span class="inserted"><ins><em>was 
apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -804,50 +805,60 @@
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201809070"&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://developer.apple.com/xcode/"&gt;Here</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they</em></ins></span> are <span 
class="removed"><del><strong>details&lt;/a&gt;. While 
this</strong></del></span> <span 
class="inserted"><ins><em>suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network</em></ins></span> is <span 
class="removed"><del><strong>a crack in the prison walls,</strong></del></span> 
<span class="inserted"><ins><em>said to be
+    &ldquo;secure,&rdquo; but</em></ins></span> it is <span 
class="removed"><del><strong>not
+big enough to mean that the iThings are no longer jails.&lt;/p&gt;
+
+&lt;h4&gt;Examples of censorship by</strong></del></span> <span 
class="inserted"><ins><em>obviously &lt;em&gt;not&lt;/em&gt; secure 
from</em></ins></span>
+    Apple <span class="removed"><del><strong>jails&lt;/h4&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+      
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
+      deleted several VPNs</strong></del></span> <span 
class="inserted"><ins><em>or</em></ins></span> from <span 
class="removed"><del><strong>its app store for China&lt;/a&gt;, thus using
+      its own censorship power to strengthen</strong></del></span> <span 
class="inserted"><ins><em>governments</em></ins></span> that <span 
class="removed"><del><strong>of</strong></del></span> <span 
class="inserted"><ins><em>can command Apple's obedience (such
+    as</em></ins></span> the <span class="removed"><del><strong>Chinese
+      government.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Apple is &lt;a
+      
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
+      censoring apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201809070"&gt;
+    &lt;p&gt;Adware Doctor, an ad blocker</em></ins></span> for <span 
class="inserted"><ins><em>MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports</em></ins></span>
-    the <span class="removed"><del><strong>prison walls,</strong></del></span> 
<span class="inserted"><ins><em>user's browsing history&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>US government too&lt;/a&gt;. 
Specifically, it
+      is deleting apps developed by Iranians.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user's browsing history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make</em></ins></span> it 
<span class="removed"><del><strong>is not
-big enough</strong></del></span> <span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201711250"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>root of these wrongs are 
in Apple. If Apple had not designed</strong></del></span> <span 
class="inserted"><ins><em>DMCA and</em></ins></span> the <span 
class="removed"><del><strong>iMonsters</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="removed"><del><strong>mean 
that</strong></del></span> <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
+    illegal</em></ins></span> to <span class="removed"><del><strong>let Apple 
censor applications,</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the <span 
class="inserted"><ins><em>latest</em></ins></span> iThings <span 
class="removed"><del><strong>are no longer jails.&lt;/p&gt;
-
-&lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
-      deleted several VPNs from its app store</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>China&lt;/a&gt;, thus using
-      its own censorship power</strong></del></span> <span 
class="inserted"><ins><em>you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>strengthen that of the Chinese
-      government.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+    them off&mdash;only until 5am.  That's</em></ins></span> Apple <span 
class="inserted"><ins><em>for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;</em></ins></span>
-    &lt;p&gt;Apple <span class="removed"><del><strong>is</strong></del></span> 
<span class="inserted"><ins><em>proposes</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
-      censoring apps for the US government too&lt;/a&gt;. Specifically, it
-      is deleting apps developed by Iranians.&lt;/p&gt;
-    &lt;p&gt;The root of these wrongs are in Apple. If Apple had not designed
-      the iMonsters</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
-    to <span class="removed"><del><strong>let Apple censor applications, 
Apple</strong></del></span> <span class="inserted"><ins><em>use it without 
having your fingerprints taken. Users</em></ins></span> would <span 
class="removed"><del><strong>not</strong></del></span> have
+  &lt;li id="M201702150"&gt;
+    &lt;p&gt;Apple proposes &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
+    to use it without having your fingerprints taken. Users</em></ins></span> 
would <span class="removed"><del><strong>not</strong></del></span> have
       <span class="removed"><del><strong>had</strong></del></span>
     <span class="inserted"><ins><em>no way to tell whether</em></ins></span> 
the <span class="removed"><del><strong>power</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
@@ -1158,7 +1169,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:44 $
+$Date: 2019/06/07 08:33:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- malware-apple.de.po 18 May 2019 08:29:44 -0000      1.129
+++ malware-apple.de.po 7 Jun 2019 08:33:53 -0000       1.130
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1089,6 +1089,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- malware-apple.es.po 19 May 2019 09:38:11 -0000      1.135
+++ malware-apple.es.po 7 Jun 2019 08:33:53 -0000       1.136
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -908,6 +909,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-apple.fr.po 18 May 2019 12:25:57 -0000      1.142
+++ malware-apple.fr.po 7 Jun 2019 08:33:53 -0000       1.143
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2019-05-18 14:23+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -910,6 +911,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-apple.it-diff.html  18 May 2019 08:29:44 -0000      1.42
+++ malware-apple.it-diff.html  7 Jun 2019 08:33:53 -0000       1.43
@@ -407,62 +407,62 @@
 
 &lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike</strong></del></span> 
<span class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest 
of</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506250"&gt;
     &lt;p&gt;Apple has banned iThing
-    applications that show</em></ins></span> the <span 
class="removed"><del><strong>rest</strong></del></span> <span 
class="inserted"><ins><em>confederate flag.  &lt;a
+    applications that show</em></ins></span> the <span 
class="removed"><del><strong>file
+  they do not count</strong></del></span> <span 
class="inserted"><ins><em>confederate flag.  &lt;a
     
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
-    Not only those that use it as a symbol</em></ins></span> of <span 
class="inserted"><ins><em>racism&lt;/a&gt;, but even
-    strategic games that use it to represent confederate army units
-    fighting in</em></ins></span> the <span class="removed"><del><strong>file
-  they do</strong></del></span> <span class="inserted"><ins><em>Civil 
War.&lt;/p&gt;
+    Not only those that use it</em></ins></span> as <span 
class="removed"><del><strong>malware. We mention them</strong></del></span> 
<span class="inserted"><ins><em>a symbol of racism&lt;/a&gt;, but even
+    strategic games that use it</em></ins></span> to <span 
class="removed"><del><strong>refute</strong></del></span> <span 
class="inserted"><ins><em>represent confederate army units
+    fighting in</em></ins></span> the
+  <span class="removed"><del><strong>supposition</strong></del></span> <span 
class="inserted"><ins><em>Civil War.&lt;/p&gt;
 
-    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple 
should</em></ins></span>
-    not <span class="removed"><del><strong>count as malware. We mention 
them</strong></del></span> <span class="inserted"><ins><em>be 
allowed</em></ins></span> to <span 
class="removed"><del><strong>refute</strong></del></span> <span 
class="inserted"><ins><em>censor apps.  Even if Apple carried out this act of
-    censorship with some care, it would still be wrong.  Whether racism
-    is bad, whether educating people about drone attacks is bad, are 
not</em></ins></span>
-    the
-  <span class="removed"><del><strong>supposition that prestigious proprietary 
software doesn't</strong></del></span> <span class="inserted"><ins><em>real 
issue.  Apple should not</em></ins></span> have <span 
class="removed"><del><strong>grave
+    &lt;p&gt;This ludicrous rigidity illustrates the point</em></ins></span> 
that <span class="removed"><del><strong>prestigious proprietary software 
doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an 
attacker</strong></del></span> <span class="inserted"><ins><em>the 
power</em></ins></span> to <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from</strong></del></span> <span 
class="inserted"><ins><em>impose its views
-    about either of these questions, or</em></ins></span> any <span 
class="removed"><del><strong>application which uses</strong></del></span> <span 
class="inserted"><ins><em>other.&lt;/p&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API</strong></del></span> 
<span class="inserted"><ins><em>Apple should
+    not be</em></ins></span> allowed <span class="removed"><del><strong>an 
attacker</strong></del></span> to <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which uses</strong></del></span> <span 
class="inserted"><ins><em>censor apps.  Even if Apple carried 
out</em></ins></span> this <span 
class="removed"><del><strong>API</strong></del></span> <span 
class="inserted"><ins><em>act of
+    censorship with some care, it would still be wrong.  Whether racism
+    is bad, whether educating people about drone attacks is bad, are not
+    the real issue.  Apple should not have the power</em></ins></span> to 
<span class="removed"><del><strong>render
+    a certain kind</strong></del></span> <span 
class="inserted"><ins><em>impose its views
+    about either</em></ins></span> of <span class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these questions, or any 
other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201412110"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
     More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used</em></ins></span> this <span 
class="removed"><del><strong>API</strong></del></span> <span 
class="inserted"><ins><em>censorship power in 2014</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple used this censorship power</em></ins></span> in <span 
class="inserted"><ins><em>2014 to &lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for the iThings for</em></ins></span> a 
<span class="removed"><del><strong>certain kind of image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time.  It also &lt;a
-    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
-    banned a game about growing marijuana&lt;/a&gt;, while permitting games
+    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the iThings <span 
class="removed"><del><strong>Messages
+      app</strong></del></span> <span class="inserted"><ins><em>for a time.  
It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    banned</em></ins></span> a <span class="removed"><del><strong>malicious 
web site to extract all</strong></del></span> <span 
class="inserted"><ins><em>game about growing marijuana&lt;/a&gt;, while 
permitting games
     about other crimes such as killing people.  Perhaps Apple considers
-    killing more acceptable than marijuana.&lt;/p&gt;</em></ins></span>
+    killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug in</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201402070"&gt;
+  &lt;li id="M201402070"&gt;
     &lt;p&gt;Apple rejected an app that displayed the locations
     of US drone assassinations, giving various excuses. Each
-    time</em></ins></span> the <span class="removed"><del><strong>iThings 
Messages
-      app</strong></del></span> <span class="inserted"><ins><em>developers 
fixed one &ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection, 
Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-        a malicious web site to extract all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app based 
on the subject matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    time the developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, Apple &lt;a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    admitted it was censoring the app based on</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -576,30 +576,31 @@
   &lt;/li&gt;
 
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Apple Music client
+      program &lt;a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+      the user's file system for music files, copies them to an Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;</em></ins></span>
     &lt;p&gt;Apple &lt;a
-    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</em></ins></span>
     stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
-    while refusing to fix them itself.&lt;/p&gt;
+    while refusing to fix them <span 
class="removed"><del><strong>itself.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201605040"&gt;</em></ins></span>
-    &lt;p&gt;The Apple Music client program &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
+  &lt;li id="M201605040"&gt;
+    &lt;p&gt;The Apple Music client program &lt;a
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
     the user's file system for music files, copies them to an Apple server,
-    and deletes them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Apple &lt;a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-stops users from fixing the security bugs in Quicktime for
-      Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
+    and deletes them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201602050"&gt;</em></ins></span>
     &lt;p&gt;iOS version 9 for iThings &lt;a
@@ -637,20 +638,32 @@
     censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple
-  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted from iPods the music that users had got from internet music
-  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
-&lt;/ul&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said to be
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span class="removed"><del><strong>iPods the 
music that users had got</strong></del></span>
+    <span class="inserted"><ins><em>Apple or</em></ins></span> from <span 
class="removed"><del><strong>internet music
+  stores</strong></del></span> <span 
class="inserted"><ins><em>governments</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can command Apple's obedience (such
+    as the US and China).&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201809070"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
@@ -1021,7 +1034,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:44 $
+$Date: 2019/06/07 08:33:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- malware-apple.it.po 18 May 2019 08:29:44 -0000      1.123
+++ malware-apple.it.po 7 Jun 2019 08:33:53 -0000       1.124
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1117,6 +1117,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-apple.ja-diff.html  18 May 2019 08:29:44 -0000      1.53
+++ malware-apple.ja-diff.html  7 Jun 2019 08:33:53 -0000       1.54
@@ -325,9 +325,9 @@
 &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
 walls of the iThing jail: users can now install apps built from
 source code, provided the source code is written in Swift.  Users
-cannot do this freely because they are required to identify
+cannot do this freely because they are required</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
+are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="inserted"><ins><em>crack in the prison walls, it is not
 big enough to mean that the iThings are no longer jails.&lt;/p&gt;
 
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
@@ -362,8 +362,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
-    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    &lt;p&gt;Apple used its censorship</em></ins></span> system <span 
class="removed"><del><strong>upgrade</strong></del></span> <span 
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
     by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
@@ -429,10 +429,10 @@
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for the iThings for</em></ins></span> a 
<span class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
+    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
     killing more acceptable than marijuana.&lt;/p&gt;
@@ -502,21 +502,22 @@
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>lot like malware, since they</strong></del></span> 
<span class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
+    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
+    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple
+<span class="removed"><del><strong>actions that harm</strong></del></span> to 
<span class="inserted"><ins><em>block
     Telegram in Russia.&lt;/p&gt;
 
     &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
-    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they</em></ins></span>
-    are <span class="removed"><del><strong>technical</strong></del></span> 
<span class="inserted"><ins><em>jails&lt;/a&gt;, they don't permit any app to 
be free software.&lt;/p&gt;
+    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
     &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
     
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+    changes</em></ins></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>file system from HFS+  to APFS&lt;/a&gt;, which 
cannot be
+    accessed from GNU/Linux, Windows or even older versions</em></ins></span> 
of <span class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706060"&gt;
@@ -524,10 +525,12 @@
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile,</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span> 
<span class="inserted"><ins><em>stops people from fixing problems themselves;
-    that's the nature of proprietary software.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Meanwhile,</em></ins></span> Apple <span 
class="inserted"><ins><em>stops people from fixing problems themselves;
+    that's the nature of proprietary</em></ins></span> software.&lt;/p&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;/li&gt;
 
   &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
@@ -537,7 +540,7 @@
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
     &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer</em></ins></span> to <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="inserted"><ins><em>term &lt;a
+    to describe the DRM, but we prefer to use the term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
     handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -545,10 +548,7 @@
   &lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-    stops</em></ins></span> users <span class="removed"><del><strong>of 
specific Apple software.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>from fixing 
the security bugs in Quicktime for Windows&lt;/a&gt;,
+    stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -604,20 +604,32 @@
     censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple
-  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted from iPods the music that users had got from internet music
-  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
-&lt;/ul&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said to be
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span class="removed"><del><strong>iPods the 
music that users had got</strong></del></span>
+    <span class="inserted"><ins><em>Apple or</em></ins></span> from <span 
class="removed"><del><strong>internet music
+  stores</strong></del></span> <span 
class="inserted"><ins><em>governments</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can command Apple's obedience (such
+    as the US and China).&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201809070"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
@@ -980,7 +992,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:44 $
+$Date: 2019/06/07 08:33:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- malware-apple.ja.po 18 May 2019 08:29:44 -0000      1.104
+++ malware-apple.ja.po 7 Jun 2019 08:33:53 -0000       1.105
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -912,6 +912,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-apple.nl-diff.html  18 May 2019 08:29:44 -0000      1.59
+++ malware-apple.nl-diff.html  7 Jun 2019 08:33:53 -0000       1.60
@@ -325,9 +325,9 @@
 &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
 walls of the iThing jail: users can now install apps built from
 source code, provided the source code is written in Swift.  Users
-cannot do this freely because they are required to identify
+cannot do this freely because they are required</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
+are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="inserted"><ins><em>crack in the prison walls, it is not
 big enough to mean that the iThings are no longer jails.&lt;/p&gt;
 
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
@@ -362,8 +362,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
-    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    &lt;p&gt;Apple used its censorship</em></ins></span> system <span 
class="removed"><del><strong>upgrade</strong></del></span> <span 
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
     by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
@@ -429,10 +429,10 @@
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for the iThings for</em></ins></span> a 
<span class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
+    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
     killing more acceptable than marijuana.&lt;/p&gt;
@@ -502,21 +502,22 @@
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>lot like malware, since they</strong></del></span> 
<span class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
+    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
+    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple
+<span class="removed"><del><strong>actions that harm</strong></del></span> to 
<span class="inserted"><ins><em>block
     Telegram in Russia.&lt;/p&gt;
 
     &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
-    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they</em></ins></span>
-    are <span class="removed"><del><strong>technical</strong></del></span> 
<span class="inserted"><ins><em>jails&lt;/a&gt;, they don't permit any app to 
be free software.&lt;/p&gt;
+    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
     &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
     
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+    changes</em></ins></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>file system from HFS+  to APFS&lt;/a&gt;, which 
cannot be
+    accessed from GNU/Linux, Windows or even older versions</em></ins></span> 
of <span class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706060"&gt;
@@ -524,10 +525,12 @@
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile,</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span> 
<span class="inserted"><ins><em>stops people from fixing problems themselves;
-    that's the nature of proprietary software.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Meanwhile,</em></ins></span> Apple <span 
class="inserted"><ins><em>stops people from fixing problems themselves;
+    that's the nature of proprietary</em></ins></span> software.&lt;/p&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;/li&gt;
 
   &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
@@ -537,7 +540,7 @@
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
     &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer</em></ins></span> to <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="inserted"><ins><em>term &lt;a
+    to describe the DRM, but we prefer to use the term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
     handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -545,10 +548,7 @@
   &lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-    stops</em></ins></span> users <span class="removed"><del><strong>of 
specific Apple software.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>from fixing 
the security bugs in Quicktime for Windows&lt;/a&gt;,
+    stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -604,20 +604,32 @@
     censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple
-  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted from iPods the music that users had got from internet music
-  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
-&lt;/ul&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said to be
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span class="removed"><del><strong>iPods the 
music that users had got</strong></del></span>
+    <span class="inserted"><ins><em>Apple or</em></ins></span> from <span 
class="removed"><del><strong>internet music
+  stores</strong></del></span> <span 
class="inserted"><ins><em>governments</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can command Apple's obedience (such
+    as the US and China).&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201809070"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
@@ -980,7 +992,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:44 $
+$Date: 2019/06/07 08:33:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-apple.nl.po 18 May 2019 08:29:44 -0000      1.59
+++ malware-apple.nl.po 7 Jun 2019 08:33:53 -0000       1.60
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -922,6 +922,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-apple.pot   18 May 2019 08:29:44 -0000      1.71
+++ malware-apple.pot   7 Jun 2019 08:33:53 -0000       1.72
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -636,6 +636,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a "
+"href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\";> track "
+"iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a "
 
"href=\"https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history\";>reports
 "
 "the user's browsing history</a>."

Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- malware-apple.ru.po 18 May 2019 08:59:41 -0000      1.197
+++ malware-apple.ru.po 7 Jun 2019 08:33:53 -0000       1.198
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2019-01-29 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -901,6 +902,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- nl.po       2 Jun 2019 17:01:05 -0000       1.93
+++ nl.po       7 Jun 2019 08:33:53 -0000       1.94
@@ -1414,6 +1414,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- pl.po       2 Jun 2019 17:01:05 -0000       1.93
+++ pl.po       7 Jun 2019 08:33:53 -0000       1.94
@@ -1151,6 +1151,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- pot 2 Jun 2019 17:01:05 -0000       1.92
+++ pot 7 Jun 2019 08:33:53 -0000       1.93
@@ -1013,6 +1013,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-surveillance.de-diff.html       2 Jun 2019 17:01:05 -0000       
1.76
+++ proprietary-surveillance.de-diff.html       7 Jun 2019 08:33:53 -0000       
1.77
@@ -646,7 +646,12 @@
     to
       <span class="removed"><del><strong>users' text messages.&lt;/dd&gt;
 
-    &lt;dt&gt;DroidVPN</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN 
developers</strong></del></span> have <span 
class="removed"><del><strong>confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -657,28 +662,33 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps and also core system logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it 
<span class="removed"><del><strong>stores detailed logs
-      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>UK government if
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can &lt;a
+    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said</em></ins></span> to 
<span class="removed"><del><strong>LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>be
+    &ldquo;secure,&rdquo; but</em></ins></span> it <span 
class="removed"><del><strong>stores detailed logs
+      and may turn them over to</strong></del></span> <span 
class="inserted"><ins><em>is obviously &lt;em&gt;not&lt;/em&gt; secure from
+    Apple or from governments that can command Apple's obedience (such
+    as</em></ins></span> the <span class="removed"><del><strong>UK government 
if
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages returned 
to</strong></del></span> <span class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
+    &lt;dd&gt;Injects JavaScript code into</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>HTML pages returned</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated purpose 
of</strong></del></span> <span class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated purpose 
of</strong></del></span> <span class="inserted"><ins><em>latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>JS injection is</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
+    &lt;p&gt;In</em></ins></span> the <span class="removed"><del><strong>JS 
injection is</strong></del></span> <span class="inserted"><ins><em>latest 
iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
@@ -764,23 +774,24 @@
 
     &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>Android apps can collude to transmit users' 
personal
        data</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens</strong></del></span>
+       tens of thousands</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>many celebrities&lt;/a&gt;. They needed to break 
Apple's
-    security to get at them, but NSA can access any</em></ins></span> of <span 
class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+    nude photos</em></ins></span> of <span class="removed"><del><strong>pairs 
that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details</strong></del></span> <span 
class="inserted"><ins><em>many celebrities&lt;/a&gt;. They needed to break 
Apple's
+    security to get at them, but NSA can access any</em></ins></span> of <span 
class="removed"><del><strong>users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;p&gt;Merely asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  &lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can, and regularly does, &lt;a
+    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
     remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users 
is</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
@@ -837,12 +848,14 @@
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
     to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
     email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
-    to it.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+place!&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
+    to it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -851,11 +864,8 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201904130"&gt;</em></ins></span>
-    &lt;p&gt;Google <span class="removed"><del><strong>Play (a component of 
Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;</strong></del></span>
 tracks the <span class="removed"><del><strong>users'</strong></del></span> 
movements <span class="removed"><del><strong>without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>of Android phones,</em></ins></span> and <span 
class="removed"><del><strong>location</strong></del></span> <span 
class="inserted"><ins><em>sometimes &lt;a
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
@@ -892,11 +902,11 @@
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
+    &lt;p&gt;Google Play (a</em></ins></span> component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location</em></ins></span> 
tracking, you must
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
     disable Google Play itself to completely stop the tracking.  This is
     yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
@@ -1278,81 +1288,83 @@
 
     &lt;p&gt;It shows</em></ins></span> that
       <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI</strong></del></span> <span class="inserted"><ins><em>no 
one</em></ins></span> can <span class="removed"><del><strong>remotely 
activate</strong></del></span> <span class="inserted"><ins><em>trust a nonfree 
program, not even</em></ins></span> the <span class="removed"><del><strong>GPS 
and microphone in Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is
-      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+      the FBI</strong></del></span> <span class="inserted"><ins><em>no 
one</em></ins></span> can <span class="removed"><del><strong>remotely 
activate</strong></del></span> <span class="inserted"><ins><em>trust a nonfree 
program, not even</em></ins></span> the <span class="removed"><del><strong>GPS 
and microphone in</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information</em></ins></span> on
-      <span class="removed"><del><strong>remote command and users cannot stop 
them:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how</em></ins></span> Android
+      <span class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>apps use</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose is to 
restrict
-      the</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps</em></ins></span> use <span class="inserted"><ins><em>and
-    misuse users' personal data&lt;/a&gt;. As</em></ins></span> of <span 
class="removed"><del><strong>data on</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>user's 
computer, but it does surveillance
-      too:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
+      remote command</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of</strong></del></span> other 
<span class="removed"><del><strong>people's phone
+    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="removed"><del><strong>users cannot stop them:</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>hardware 
identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="inserted"><ins><em>in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
+    that</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>data on the user's computer, but it 
does</strong></del></span> <span class="inserted"><ins><em>a development 
platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a</em></ins></span> surveillance
+      <span class="removed"><del><strong>too:</strong></del></span> <span 
class="inserted"><ins><em>feature for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
       numbers.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The moviepass app</strong></del></span> <span 
class="inserted"><ins><em>companies,</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy on users even more than users
-      expected. It</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before and after going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+    &lt;p&gt;The moviepass app and dis-service spy</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="inserted"><ins><em>take action. This proves
-    that the policies of</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be</em></ins></span> on <span class="removed"><del><strong>users 
even</strong></del></span> <span class="inserted"><ins><em>Google Play had one 
or</em></ins></span> more <span class="removed"><del><strong>than users
+      expected. It</strong></del></span> <span 
class="inserted"><ins><em>malicious functionalities, such as</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>after going to a movie&lt;/a&gt;.
     &lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered 
driving</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>have a surveillance feature for</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
+    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
-      book</strong></del></span> <span class="inserted"><ins><em>often 
malicious ads on users, and redirecting
+  &lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span> <span 
class="inserted"><ins><em>often malicious ads on users,</em></ins></span> and 
<span class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
+      book</strong></del></span> <span class="inserted"><ins><em>redirecting
     them</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note</strong></del></span> <span class="inserted"><ins><em>phishing 
sites</em></ins></span> that <span class="removed"><del><strong>this article 
misuses</strong></del></span> <span class="inserted"><ins><em>stole their 
credentials. Furthermore,</em></ins></span>
     the <span class="removed"><del><strong>words
       &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
@@ -1466,11 +1478,11 @@
       all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+    track the phones of users</em></ins></span> that <span 
class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span> <span 
class="inserted"><ins><em>have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
@@ -1528,9 +1540,9 @@
     their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
       2015 it &lt;a
 
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span class="removed"><del><strong>submit to 
increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span>
-    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
+      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span 
class="removed"><del><strong>submit</strong></del></span>
+    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
+      are starting to realize that it is nasty.&lt;/p&gt;
 
       &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>get rid of</em></ins></span> the <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
     Android by</em></ins></span> &lt;a
@@ -1611,27 +1623,23 @@
 
     &lt;p&gt;Google</em></ins></span> did not
       <span class="removed"><del><strong>ask about 
sending</strong></del></span> <span class="inserted"><ins><em>intend to make 
these apps spy; on the contrary,</em></ins></span> it
-    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="inserted"><ins><em>prevent that, and deleted these apps after
+    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="removed"><del><strong>other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>prevent that, and 
deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
+    for</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
 
-    &lt;p&gt;On the</em></ins></span> other <span 
class="removed"><del><strong>companies.  This shows</strong></del></span> <span 
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
-    therefore shares in</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>responsibility for the injustice of their being
+    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps, and
+    therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="inserted"><ins><em>preventing apps from
-    cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps, and study
-    the source code somehow</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>determine whether they mistreat users in
-    various ways. If it did</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information to anyone?  A free software 
flashlight</strong></del></span> <span class="inserted"><ins><em>good job of 
this, it could more or less
-    prevent such snooping, except when the</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
+    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
+    to <span class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1643,9 +1651,13 @@
 &lt;ul&gt;
 
   &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>developers are clever
-    enough</em></ins></span> to <span class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>conversation between two</strong></del></span> 
<span class="inserted"><ins><em>checking.&lt;/p&gt;
+    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span> 
to <span class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span> <span class="inserted"><ins><em>see what they 
do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job</em></ins></span> of <span 
class="inserted"><ins><em>this, it could more or less
+    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
@@ -1655,9 +1667,9 @@
   &lt;li id="M201705230"&gt;
     &lt;p&gt;Apps for BART &lt;a
     
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop on</em></ins></span> users&lt;/a&gt;.&lt;/p&gt;
+    snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    <span class="inserted"><ins><em>&lt;p&gt;With free software apps, users 
could &lt;em&gt;make sure&lt;/em&gt; that they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
@@ -3459,7 +3471,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/02 17:01:05 $
+$Date: 2019/06/07 08:33:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- proprietary-surveillance.de.po      2 Jun 2019 17:01:05 -0000       1.291
+++ proprietary-surveillance.de.po      7 Jun 2019 08:33:53 -0000       1.292
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1236,6 +1236,19 @@
 msgstr " "
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | The DMCA and the EU Copyright Directive make it <a
 # | href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\";>
 # | illegal to study how iOS [-cr...apps-] {+cr&hellip;apps+} spy on

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.437
retrieving revision 1.438
diff -u -b -r1.437 -r1.438
--- proprietary-surveillance.fr.po      3 Jun 2019 07:54:28 -0000       1.437
+++ proprietary-surveillance.fr.po      7 Jun 2019 08:33:53 -0000       1.438
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2019-06-02 19:12+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -902,6 +903,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing.";
 "net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
 "cr&hellip;apps spy on users</a>, because this would require circumventing "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary-surveillance.it-diff.html       2 Jun 2019 17:01:06 -0000       
1.143
+++ proprietary-surveillance.it-diff.html       7 Jun 2019 08:33:54 -0000       
1.144
@@ -634,9 +634,20 @@
     disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
     yet another example of nonfree software pretending</strong></del></span>
     <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones</em></ins></span>
-    to <span class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
+    to <span class="removed"><del><strong>obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;
+
   &lt;/li&gt;
-&lt;/ul&gt;
+  
+  &lt;li&gt;&lt;p&gt;More than 73% of the most popular Android apps
+  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated to the app's functionality,
+  was</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -645,63 +656,50 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a 
thing</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this</em></ins></span> would <span class="removed"><del><strong>be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>require circumventing the iOS 
DRM.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% 
of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the <span class="removed"><del><strong>most 
popular Android apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span class="inserted"><ins><em>latest 
iThings system,
-    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated 
to</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was</strong></del></span> <span class="inserted"><ins><em>obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
   found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The 
clear</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced</em></ins></span> 
way <span class="removed"><del><strong>to say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+  &ldquo;free&rdquo;&mdash;they</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they</em></ins></span> are <span 
class="removed"><del><strong>not free software.  The clear way to say
+  &ldquo;zero price&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>really does turn
-    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>granted that the usual analytics tools are
-  legitimate, but is that valid?  Software developers have no 
right</strong></del></span> <span class="inserted"><ins><em>you&mdash;&ldquo;We
-    know you want</em></ins></span> to
-  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+  &lt;p&gt;The article takes for granted that the usual analytics tools are
+  legitimate,</strong></del></span> <span class="inserted"><ins><em>said to be
+    &ldquo;secure,&rdquo;</em></ins></span> but <span 
class="inserted"><ins><em>it</em></ins></span> is <span 
class="removed"><del><strong>that valid?  Software developers have no right to
+  analyze what users are doing</strong></del></span> <span 
class="inserted"><ins><em>obviously &lt;em&gt;not&lt;/em&gt; secure from
+    Apple</em></ins></span> or <span class="removed"><del><strong>how.  
&ldquo;Analytics&rdquo; tools</strong></del></span> <span 
class="inserted"><ins><em>from governments</em></ins></span> that <span 
class="removed"><del><strong>snoop are
+  just as wrong</strong></del></span> <span class="inserted"><ins><em>can 
command Apple's obedience (such</em></ins></span>
+    as <span class="removed"><del><strong>any other 
snooping.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
US and China).&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
-    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
       connect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
-    to <span class="removed"><del><strong>100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>use it without 
having your fingerprints taken. Users would have
-    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>phone</em></ins></span> is <span 
class="removed"><del><strong>present in some Android devices when they are sold.
-      Some Motorola phones modify Android to</strong></del></span> <span 
class="inserted"><ins><em>snooping on them.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal</em></ins></span> to <span class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy</em></ins></span> on 
<span class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
+      Some Motorola phones modify Android to</strong></del></span>
 
-  &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a
       &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -729,16 +727,24 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of</em></ins></span> personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
+    &lt;p&gt;Apple proposes</em></ins></span> &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    fingerprint-scanning touch <span 
class="removed"><del><strong>screen&lt;/a&gt;
+      &mdash; which</strong></del></span> <span 
class="inserted"><ins><em>screen&lt;/a&gt;&mdash;which</em></ins></span> would 
mean no way
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether the phone is snooping on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611170"&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -890,158 +896,106 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen to</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
+      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location</strong></del></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>phone has to be responsible for 
sending</em></ins></span>
-    the <span class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data that their transmission is a
-      substantial expense for users.  Said transmission, not wanted or
-      requested by</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what</em></ins></span> the <span class="removed"><del><strong>user, 
clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data <span 
class="inserted"><ins><em>to Google.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android</em></ins></span> phone
-      <span class="removed"><del><strong>&lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>location data while</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that</strong></del></span>
-    <span class="inserted"><ins><em>airplane mode.  Instead,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up</em></ins></span> the <span class="removed"><del><strong>GPS 
and microphone in Android
-      phones</strong></del></span> <span 
class="inserted"><ins><em>data,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is
-      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
-      remote command and users cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require</strong></del></span> <span 
class="inserted"><ins><em>sent them</em></ins></span> all <span 
class="removed"><del><strong>new portable phones
-      to have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201812060"&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
+    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
+    what</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is to restrict
-      the use of data on the user's computer, but it does surveillance
-      too:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
-    the <span class="removed"><del><strong>user's list of other 
people's</strong></del></span> phone
-      <span 
class="removed"><del><strong>numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201811230"&gt;
+    &lt;p&gt;An Android phone was observed to track</em></ins></span> location 
<span class="inserted"><ins><em>even while
+    in airplane mode. It didn't send the location data while in
+    airplane mode.  Instead, &lt;a
+    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
+    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711210"&gt;
+    &lt;p&gt;Android tracks location for Google &lt;a
+    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
+  &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending</em></ins></span> lots of <span 
class="removed"><del><strong>surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal</strong></del></span> 
data <span class="removed"><del><strong>in the device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give Verizon the same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>Android) &lt;a
+  &lt;li id="M201609140"&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the users' <span 
class="removed"><del><strong>searches that</strong></del></span> <span 
class="inserted"><ins><em>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable</em></ins></span> Google <span 
class="removed"><del><strong>normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>Maps</em></ins></span> and <span 
class="removed"><del><strong>the
-    user</strong></del></span> <span class="inserted"><ins><em>location 
tracking, you</em></ins></span> must <span 
class="removed"><del><strong>explicitly opt-in before the app takes effect. 
However,</strong></del></span>
-    <span class="inserted"><ins><em>disable Google Play itself to completely 
stop</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>tracking.  This</em></ins></span> is
-    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts</strong></del></span>
-    <span class="inserted"><ins><em>yet another example</em></ins></span> of 
<span class="removed"><del><strong>data in</strong></del></span> <span 
class="inserted"><ins><em>nonfree software pretending to obey the user,
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
+    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
+    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+    unthinkable with free software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
     that users can't delete&lt;/a&gt;, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;
+    of some
+      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201403120"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
     Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
     &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports that &lt;a
+    Journal (in</em></ins></span> an article blocked from us by a paywall) 
reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
     and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201307280"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command and users cannot stop them:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
     &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
     listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
@@ -1052,14 +1006,16 @@
     
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
     the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
-    legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="inserted"><ins><em>not 
enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
+    reading</em></ins></span> the <span class="removed"><del><strong>use of 
data on</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>collects on users, instead of
+    hiding</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other</strong></del></span> 
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
@@ -1067,37 +1023,58 @@
   &lt;li id="M201111170"&gt;
     &lt;p&gt;Some manufacturers add a &lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal data in the 
device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201410080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries, &lt;a
-    
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots</em></ins></span> of <span class="removed"><del><strong>its 
phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page</em></ins></span> the user <span 
class="removed"><del><strong>must explicitly opt-in before the app takes 
effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -1114,19 +1091,33 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
+    often</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts</strong></del></span> <span class="inserted"><ins><em>legal 
threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>data in the phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
+    makes</em></ins></span> it <span class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the 
ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+    &lt;p&gt;This <span 
class="removed"><del><strong>example</strong></del></span> illustrates <span 
class="removed"><del><strong>how &ldquo;getting the user's consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>that making unauthorized copies of nonfree 
software</em></ins></span>
+    is <span class="removed"><del><strong>inadequate as</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cure for the injustice of nonfree software. It may 
avoid
+    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1135,206 +1126,378 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>various sites 
+      such</strong></del></span> <span class="inserted"><ins><em>users, 
too,</em></ins></span> as <span class="removed"><del><strong>Facebook, Google+ 
and Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you must expect from nonfree
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
 
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to <span class="removed"><del><strong>share 
the picture you take according</strong></del></span> <span 
class="inserted"><ins><em>run a proprietary phone 
app&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>who
+      is in</strong></del></span> <span class="inserted"><ins><em>be allowed 
into</em></ins></span>
+    the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span class="inserted"><ins><em>app is a</em></ins></span> 
spyware <span class="removed"><del><strong>feature seems to require online 
access to some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>that can snoop on a lot of
     sensitive data, including user's location and contact list, and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
-    and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
-    spying on you is available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    available</em></ins></span> to <span class="inserted"><ins><em>employers 
and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can 
easily</em></ins></span> be
+      <span class="removed"><del><strong>sent across</strong></del></span>
+    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
+    and <span class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore,</strong></del></span> <span class="inserted"><ins><em>freedom 
to make their own pregnancy choices. Don't use
+    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
+    free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based</strong></del></span> <span class="inserted"><ins><em>same 
thing without
+    spying</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>you is 
available from</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>some
+      are starting to realize that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;</em></ins></span>
+    a <span class="removed"><del><strong>way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>new one</em></ins></span> is <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>typical example</strong></del></span> <span 
class="inserted"><ins><em>huge number</em></ins></span> of
+      <span class="removed"><del><strong>the attitude of the proprietary 
software industry towards
+      those they</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
+    preinstalled nonfree apps that</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> <span 
class="inserted"><ins><em>access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden</em></ins></span> apps <span 
class="removed"><del><strong>for mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>may either call 
home with
+    the data, or pass it on to user-installed</em></ins></span> apps <span 
class="inserted"><ins><em>that have access to
     the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
+    surveillance on which</em></ins></span> the user has
+    <span class="removed"><del><strong>installed.</strong></del></span> <span 
class="inserted"><ins><em>absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
     send sensitive personal data to third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>doing this</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span>
+    <span class="inserted"><ins><em>lengthy terms of service</em></ins></span> 
that <span class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>are difficult to understand. In any case,
+    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as what the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>not 
sufficient to legitimize snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902230"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
+    library</em></ins></span> for <span class="removed"><del><strong>children 
don't respect privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>building mobile apps, which also</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies 
built</em></ins></span> apps <span class="removed"><del><strong>snoop 
on</strong></del></span> <span class="inserted"><ins><em>that
+    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>personal
+    data they collected would go</em></ins></span> to <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>snooping done by 
the phone company,</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span class="removed"><del><strong>perhaps by the OS 
in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
     Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    18,000 (23%</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> the <span 
class="removed"><del><strong>app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>total) link 
this ID</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>no excuse for malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it asked the user to
+      approve sending personal data to the app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>in apparent violation of
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
+    that</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201902060"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>interacting 
with the app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
     &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. Furthermore,
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data 
about</strong></del></span> <span class="inserted"><ins><em>often malicious ads 
on users, and redirecting</em></ins></span>
+    them to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,
     the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
+    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902010"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws were
+    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>companies, and the NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising&mdash;that could
+    potentially also be used</em></ins></span> to spy <span 
class="removed"><del><strong>through it too&lt;/a&gt;.
+      Here's information</strong></del></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half
 of
     the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    &lt;p&gt;It is unfortunate that these articles talk</em></ins></span> 
about <span class="removed"><del><strong>NSA app 
spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free
     apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will do
-    with the data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
-    the company gets that data at all.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in</strong></del></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>toys</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do</em></ins></span>
+    with <span class="inserted"><ins><em>the data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
+      enable crackers to listen in on</strong></del></span> <span 
class="inserted"><ins><em>side issue. What the company does
+    with the data is</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and even speak
+      into</strong></del></span> <span class="inserted"><ins><em>secondary 
issue. The principal wrong here is that</em></ins></span>
+    the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps &lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report</em></ins></span> on <span class="removed"><del><strong>its users 
through</strong></del></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
 
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities in the app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
+    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>same machine via
+    various apps. Some</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>them send Facebook detailed</em></ins></span> 
information about <span class="removed"><del><strong>how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement</strong></del></span>
+    <span class="inserted"><ins><em>the user's activities in the app; others 
only say</em></ins></span> that <span class="removed"><del><strong>it was 
anonymizing</strong></del></span> the <span class="removed"><del><strong>data 
may be
+      true,</strong></del></span> <span class="inserted"><ins><em>user is
+    using that app,</em></ins></span> but <span 
class="removed"><del><strong>it doesn't really matter. If it had sold the data 
to a
+      data broker, the data broker would have been able to figure out
+      who</strong></del></span> <span class="inserted"><ins><em>that alone is 
often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
user <span class="removed"><del><strong>was.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company</strong></del></span> has <span 
class="removed"><del><strong>been ordered to pay</strong></del></span> a <span 
class="removed"><del><strong>total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>phones of users 
that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected</strong></del></span> <span class="inserted"><ins><em>other 
kinds of location
+    tracking, but most users will be tricked</em></ins></span> by the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But I can't be</em></ins></span> sure <span 
class="inserted"><ins><em>from the article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will 
benefit</em></ins></span> in <span class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span>
+    <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span 
class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>one 
more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
     of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
+    and collect information about</em></ins></span> its <span 
class="removed"><del><strong>own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.  40% of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;</strong></del></span> <span class="inserted"><ins><em>its 
users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
@@ -1573,11 +1736,7 @@
   &lt;li id="M201604250"&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in</em></ins></span> the phone, and in <span 
class="removed"><del><strong>server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>server accounts,
+    spy on many sorts of data in the phone, and in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1729,130 +1888,98 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>sends it 
to third parties&lt;/a&gt;.&lt;/p&gt;
+    is found in many proprietary games. It &lt;a
+    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to</em></ins></span> the <span 
class="inserted"><ins><em>massive
+    program along with an update to the massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its</em></ins></span> user's 
<span class="removed"><del><strong>consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>computer&lt;/a&gt;.&lt;/p&gt;
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
-    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>surveillance is inadequate 
as</strong></del></span> a <span class="removed"><del><strong>protection 
against massive
-        surveillance.&lt;/p&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>certain gaming keyboard</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information to China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
-    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles</em></ins></span> snoop on <span 
class="removed"><del><strong>what radio</strong></del></span> <span 
class="inserted"><ins><em>their users</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
-      are playing nearby&lt;/a&gt;.  Also on</strong></del></span> <span 
class="inserted"><ins><em>report to the
-    internet&lt;/a&gt;&mdash;even</em></ins></span> what <span 
class="inserted"><ins><em>their</em></ins></span> users <span 
class="removed"><del><strong>post on various sites 
-      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>weigh.&lt;/p&gt;
+  &lt;li id="M201512290"&gt;
+    &lt;p&gt;Many &lt;a
+    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+    video game consoles snoop on their users and report to the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console is a computer,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you can't trust a computer with
-    a nonfree operating system.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A game console is a computer, and you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share</strong></del></span> <span 
class="inserted"><ins><em>their users'
+  &lt;li id="M201509160"&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that 
merge</em></ins></span> the <span class="removed"><del><strong>picture you take 
according</strong></del></span> <span class="inserted"><ins><em>data
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
     &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
-    use a back door</em></ins></span> to <span class="removed"><del><strong>who
-      is in</strong></del></span> <span 
class="inserted"><ins><em>manipulate</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>game play for specific players.&lt;/p&gt;
-
-    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
-    can use</em></ins></span> the <span class="removed"><del><strong>wire to 
Facebook's servers</strong></del></span> <span class="inserted"><ins><em>same 
tactics.&lt;/p&gt;
+    &lt;p&gt;While the article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
     &lt;p&gt;Angry Birds &lt;a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>NSA takes 
advantage</em></ins></span>
-    to <span class="removed"><del><strong>the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy 
through it too&lt;/a&gt;.  Here's information on &lt;a
+    spies for companies, and the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
     
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
-    &lt;p&gt;Blizzard Warden</em></ins></span> is <span 
class="removed"><del><strong>based</strong></del></span> <span 
class="inserted"><ins><em>a hidden
+  &lt;li id="M200510200"&gt;
+    &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM</strong></del></span> <span class="inserted"><ins><em>every 
process running on a gamer's computer</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>sniffs a
+    spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span> <span class="inserted"><ins><em>do 
with cheating.&lt;/p&gt;
+    have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>snoop on the people</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>use them&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
-
-      &lt;p&gt;This</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that the</em></ins></span> article <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It is unfortunate that the article uses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1862,9 +1989,7 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made</em></ins></span> a <span 
class="removed"><del><strong>way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>joke: The other day</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>woman came up to me and
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
@@ -1873,63 +1998,35 @@
   &lt;li id="M201901070"&gt;
     &lt;p&gt;Vizio TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in the own 
words</em></ins></span> of the <span class="removed"><del><strong>proprietary 
software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>company's
-    CTO, and this data is sold to third parties. This is in 
return</em></ins></span> for <span class="removed"><del><strong>mobile devices 
report which other
-    apps the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;better service&rdquo; (meaning more 
intrusive ads?) and slightly
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
+    CTO, and this data is sold to third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What</em></ins></span> is <span 
class="removed"><del><strong>doing</strong></del></span> <span 
class="inserted"><ins><em>supposed to make</em></ins></span> this <span 
class="removed"><del><strong>in a way</strong></del></span> <span 
class="inserted"><ins><em>spying acceptable, according to him,
-    is</em></ins></span> that <span class="removed"><del><strong>at 
least</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> is <span 
class="removed"><del><strong>visible and
-    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span> 
the <span class="removed"><del><strong>others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for 
children</strong></del></span> <span class="inserted"><ins><em>Vizio software is
-    nonfree, we</em></ins></span> don't <span 
class="removed"><del><strong>respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on the user&lt;/a&gt;. 
This</strong></del></span> <span class="inserted"><ins><em>know 
what</em></ins></span> is <span class="removed"><del><strong>in addition to
-      the snooping done by</strong></del></span> <span 
class="inserted"><ins><em>actually happening behind</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>scenes,</em></ins></span>
-    and <span class="removed"><del><strong>perhaps by the OS 
in</strong></del></span> <span class="inserted"><ins><em>there is no guarantee 
that all future updates will leave</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
+    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
+    is that it is opt-in in newer models. But since the Vizio software is
+    nonfree, we don't know what is actually happening behind the scenes,
+    and there is no guarantee that all future updates will leave the
+    settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter),</em></ins></span> the <span class="removed"><del><strong>question 
of whether</strong></del></span> <span class="inserted"><ins><em>easiest way to 
make sure it isn't spying on you is
-    to disconnect it from</em></ins></span> the <span 
class="removed"><del><strong>app developers</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
+    matter), the easiest way to make sure it isn't spying on you is
+    to disconnect it from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to</em></ins></span> get
-      <span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>your own router (which can
+    if you are technically oriented, is to get your own router (which can
     be an old computer running completely free software), and set up a
-    firewall</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
+    firewall to block connections to Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+  &lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>the facts</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>presents. It
-    is too bad that</em></ins></span> the <span 
class="removed"><del><strong>user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>article finishes by advocating the
-    moral weakness of surrendering</em></ins></span> to <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix</em></ins></span> app <span 
class="removed"><del><strong>developer but did</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1937,132 +2034,77 @@
   &lt;li id="M201702060"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and</em></ins></span> not
-      <span class="removed"><del><strong>ask about 
sending</strong></del></span> <span class="inserted"><ins><em>just broadcasts 
and
+    report everything that is viewed on them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports what</em></ins></span> it <span 
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows</strong></del></span> 
<span class="inserted"><ins><em>disable</em></ins></span> the
-      <span class="removed"><del><strong>weakness of</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
-    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511130"&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>be picked up by proprietary malware running
-    on other devices in range so as</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>determine that they
+    sounds to be picked up by proprietary malware running
+    on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
+  &lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>spying on 
their users: their</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</em></ins></span> and <span class="removed"><del><strong>then sends 
personal data about</strong></del></span>
-    <span class="inserted"><ins><em>link</em></ins></span> them <span 
class="inserted"><ins><em>your IP address&lt;/a&gt; so that advertisers can 
track you
+    manufacturers in spying on their users: their &lt;a
+    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
-    is an injustice already.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It is possible to turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and the NSA takes advantage</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
-    to <span class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's</strong></del></span> <span class="inserted"><ins><em>the 600 
millions social media profiles the company
+  &lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
-    being watched by advertisers. By combining TV viewing</em></ins></span>
-    information <span class="removed"><del><strong>on</strong></del></span> 
<span class="inserted"><ins><em>with online social media participation, Tivo 
can now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can now &lt;a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;</em></ins></span>
+    users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>toys My Friend Cayla</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize</em></ins></span> and <span 
class="removed"><del><strong>i-Que transmit</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
-      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;
+  &lt;li id="M201507240"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV &lt;a
     
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops</em></ins></span> on <span class="removed"><del><strong>a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>what programs 
people watch,</em></ins></span> and even <span 
class="removed"><del><strong>speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    snoops on what programs people watch, and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make</em></ins></span> its <span 
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
-    users <span class="removed"><del><strong>through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;
+  &lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201502090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung 
&ldquo;Smart&rdquo; TV &lt;a
+  &lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless</em></ins></span> 
it <span class="removed"><del><strong>was surrounded</strong></del></span> 
<span class="inserted"><ins><em>is done</em></ins></span> by <span 
class="removed"><del><strong>a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    software in your own computer.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than</strong></del></span> free
-    software <span class="removed"><del><strong>which users could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>in your own computer.&lt;/p&gt;
-
-    &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
     data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
@@ -2071,180 +2113,115 @@
   &lt;li id="M201411090"&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report</em></ins></span> was <span 
class="removed"><del><strong>sued for collecting lots</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products to get users' formal
-    consent before collecting personal</em></ins></span> data <span 
class="removed"><del><strong>may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>are totally inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>a
-      data broker,</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>data broker</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+    consent before collecting personal data are totally inadequate.
+    And what happens if a user declines consent? Probably the TV will
+    say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>have been able</strong></del></span> <span 
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to 
<span class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the
-    user <span class="removed"><del><strong>was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
+  &lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access</strong></del></span>
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected by</strong></del></span> <span class="inserted"><ins><em>user 
watches, and</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>switch 
to turn this off has
-    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
-    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>server</em></ins></span> could <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>save that data anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse, it &lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>user watches, 
and the switch to turn</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>off has
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
+    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
-    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
-
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
-    long-term.&lt;/p&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
-    passes by,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
 
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look</em></ins></span>
-    at <span class="removed"><del><strong>Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>the videos 
freely.  It appears Amazon has tried to prevent that
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>how Ring used to let individual employees look
+    at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>everything</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span>
-    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be a better
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>look at what's</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -3235,7 +3212,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/02 17:01:06 $
+$Date: 2019/06/07 08:33:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.304
retrieving revision 1.305
diff -u -b -r1.304 -r1.305
--- proprietary-surveillance.it.po      2 Jun 2019 17:01:06 -0000       1.304
+++ proprietary-surveillance.it.po      7 Jun 2019 08:33:54 -0000       1.305
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1215,6 +1215,19 @@
 "\">#SpywareIniThings</a>)</span>"
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | The DMCA and the EU Copyright Directive make it <a
 # | href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\";>
 # | illegal to study how iOS [-cr...apps-] {+cr&hellip;apps+} spy on

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary-surveillance.ja-diff.html       2 Jun 2019 17:01:06 -0000       
1.153
+++ proprietary-surveillance.ja-diff.html       7 Jun 2019 08:33:54 -0000       
1.154
@@ -632,10 +632,32 @@
   &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said</em></ins></span> to 
<span class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them</strong></del></span> <span class="inserted"><ins><em>be
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number</strong></del></span>
+    <span class="inserted"><ins><em>Apple or from 
governments</em></ins></span> that <span class="inserted"><ins><em>can command 
Apple's obedience (such
+    as</em></ins></span> the <span class="removed"><del><strong>user types 
into it&lt;/a&gt;; the server records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users 
cannot</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive</em></ins></span> make 
<span class="removed"><del><strong>an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal</em></ins></span> to <span class="removed"><del><strong>install 
even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving the code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>study how 
iOS cr&hellip;apps spy on users&lt;/a&gt;, because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -645,47 +667,38 @@
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702150"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots</em></ins></span> of <span class="removed"><del><strong>their users 
with third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
-    &lt;p&gt;The</em></ins></span> iMessage app on iThings &lt;a
+  &lt;li id="M201609280"&gt;
+    &lt;p&gt;The iMessage app on iThings &lt;a
     
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
     a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
+    server records these numbers for at least 30 
days.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving the code Apple
-      sends to it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47% of the most popular iOS apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload</em></ins></span> to Apple's servers 
all the photos
+    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -810,25 +823,25 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen to</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
+      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location</strong></del></span> data <span 
class="removed"><del><strong>from the
-      GPS, take photographs, read text messages, read 
call,</strong></del></span> <span class="inserted"><ins><em>for 
years&lt;/a&gt;.&lt;/p&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data <span 
class="inserted"><ins><em>to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
     what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track</em></ins></span> location 
<span class="inserted"><ins><em>even while
-    in airplane mode. It didn't send the location data while in
+    &lt;p&gt;An Android phone was observed to track location even while
+    in airplane mode. It didn't send</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
     it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
@@ -921,19 +934,19 @@
 
   &lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>user's list</strong></del></span> 
<span class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
-    legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
+    reading</em></ins></span> the <span class="removed"><del><strong>user's 
list</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+    honestly identify the information it collects on users, 
instead</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span>
+    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    &lt;p&gt;However, to truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
@@ -962,52 +975,34 @@
 
         &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
         for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps that include</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span>
+    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take 
according</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed</em></ins></span> to <span class="removed"><del><strong>who
-      is</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across the wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
 
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page the user reads at</em></ins></span> what <span 
class="removed"><del><strong>users post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1025,30 +1020,19 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
-    is <span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary 
apps</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1057,407 +1041,304 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
-    apps the user has
-    installed.</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,
+      and suggests</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
+    &lt;p&gt;It snoops on users, too, as</em></ins></span> you <span 
class="inserted"><ins><em>must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
-
-    &lt;p&gt;This app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>at least is visible</strong></del></span> <span 
class="inserted"><ins><em>can snoop on a lot of
-    sensitive data, including user's location</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>contact list, and 
has &lt;a
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to <span class="removed"><del><strong>share 
the picture you take according</strong></del></span> <span 
class="inserted"><ins><em>run a proprietary phone 
app&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>who
+      is in</strong></del></span> <span class="inserted"><ins><em>be allowed 
into</em></ins></span>
+    the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span class="inserted"><ins><em>app is a</em></ins></span> 
spyware <span class="removed"><del><strong>feature seems to require online 
access to some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
+  &lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available</em></ins></span> to <span class="inserted"><ins><em>employers 
and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can 
easily</em></ins></span> be
+      <span class="removed"><del><strong>sent across</strong></del></span>
+    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>for 
children don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
+    and <span class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore,</strong></del></span> <span class="inserted"><ins><em>freedom 
to make their own pregnancy choices. Don't use
+    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
+    free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>is often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>user&lt;/a&gt;. 
This</strong></del></span>
-    <span class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;anonymized and aggregated,&rdquo; it can 
easily be
-    traced back</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based</strong></del></span> <span class="inserted"><ins><em>same 
thing without
+    spying</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is 
available from &lt;a
+    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>snooping). In August
+      2015 it</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting to realize that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;</em></ins></span>
+    a <span class="removed"><del><strong>way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>new one</em></ins></span> is <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment</em></ins></span>
-    and <span class="removed"><del><strong>perhaps by the OS in the
-      phone.&lt;/p&gt;
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude</strong></del></span> <span class="inserted"><ins><em>huge 
number</em></ins></span> of <span class="removed"><del><strong>the proprietary 
software industry towards
+      those they</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
-      users</strong></del></span> <span 
class="inserted"><ins><em>freedom</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. 
That</strong></del></span> <span class="inserted"><ins><em>make their own 
pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
-    spying on you</em></ins></span> is <span class="removed"><del><strong>no 
excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the</em></ins></span> data, <span class="removed"><del><strong>including 
geolocation, for use by companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>or pass</em></ins></span> it <span 
class="removed"><del><strong>asked the user</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps 
that have access</em></ins></span> to
-    the <span class="removed"><del><strong>app developer</strong></del></span> 
<span class="inserted"><ins><em>network</em></ins></span> but <span 
class="removed"><del><strong>did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>no direct access</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>the data.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>results in massive
-    surveillance on which</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> <span 
class="inserted"><ins><em>access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden</em></ins></span> apps <span 
class="removed"><del><strong>for mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>may either call 
home with
+    the data, or pass it on to user-installed</em></ins></span> apps <span 
class="inserted"><ins><em>that have access to
+    the network but no direct access to the data. This results in massive
+    surveillance on which</em></ins></span> the user has
+    <span class="removed"><del><strong>installed.</strong></del></span> <span 
class="inserted"><ins><em>absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;</em></ins></span>
-    send <span class="inserted"><ins><em>sensitive personal data to third 
parties&lt;/a&gt;, which can use it
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. 
In</em></ins></span> any <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>case,
-    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>doing this</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span>
+    <span class="inserted"><ins><em>lengthy terms of service</em></ins></span> 
that <span class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>are difficult to understand. In any case,
+    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as what the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>not 
sufficient to legitimize snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>GeForce Experience</strong></del></span>
-    <span class="inserted"><ins><em>library for building mobile apps, which 
also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library</em></ins></span> for <span class="removed"><del><strong>children 
don't respect privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
-    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>personal
-    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>building mobile apps, which also</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies 
built</em></ins></span> apps <span class="removed"><del><strong>snoop 
on</strong></del></span> <span class="inserted"><ins><em>that
+    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>personal
+    data they collected would go</em></ins></span> to <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>snooping done by 
the phone company,</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span class="removed"><del><strong>perhaps 
by</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>OS in the
+      phone.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
+      users</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>other companies, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;It shows</em></ins></span> that <span 
class="removed"><del><strong>makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>no one can trust a nonfree program, not even the
-    developers</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
+    that</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives</em></ins></span> information <span 
class="removed"><del><strong>about</strong></del></span> <span 
class="inserted"><ins><em>on &lt;a
-    href="https://www.appcensus.mobi"&gt;</em></ins></span> how
-    <span class="removed"><del><strong>people</strong></del></span> <span 
class="inserted"><ins><em>Android apps</em></ins></span> use <span 
class="removed"><del><strong>it&lt;/a&gt;.&lt;/p&gt;
-
-       &lt;p&gt;The company's statement that it anonymizes the data may be
-        true, but it doesn't really matter. If it sells</strong></del></span> 
<span class="inserted"><ins><em>and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>a
-        data broker, the data broker can figure out who the user is.&lt;/p&gt;
-  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span> <span class="inserted"><ins><em>other 
companies, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware</em></ins></span> 
in <span class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-      &lt;p&gt;The app reports the temperature</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by
-      <span class="removed"><del><strong>minute (thus, indirectly, whether 
it</strong></del></span> <span class="inserted"><ins><em>resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>surrounded by a person's
-      body), and the vibration frequency.&lt;/p&gt;
-
-      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in 
apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users can check
-      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>companies, and</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>spy through it 
too&lt;/a&gt;.
+      Here's information</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>Google Play had one or</em></ins></span> more 
<span class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>redirecting
-    them to phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
+
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span> <span class="inserted"><ins><em>malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
+    people use it&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes the data may be
+        true, but it doesn't really matter. If it sells the data to a
+        data broker, the data broker can figure out who</strong></del></span> 
<span class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the user <span 
class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>interface of most of them was designed to make 
uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
-    there</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span> 
really
-<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902010"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>their
+    addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>users. 
Other technical flaws were
+    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect the emails</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>members of Parliament
-  this way, because</strong></del></span>
-    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
+    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but</em></ins></span> they <span 
class="removed"><del><strong>pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>are &lt;em&gt;not&lt;/em&gt;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;li id="M201901050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="inserted"><ins><em>will do
+    with the data.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
+    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>surrounded by</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> a <span 
class="removed"><del><strong>person's
+      body), and</strong></del></span> <span class="inserted"><ins><em>side 
issue. What</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>company does
+    with</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>data is</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users can check
+      and change.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children</strong></del></span> <span 
class="inserted"><ins><em>secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
+    &lt;p&gt;&lt;a
+    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>WeatherBug, are
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;.</em></ins></span> The 
<span class="removed"><del><strong>Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>company</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding that it 
notify</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>will do
-    with</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>using it to outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>about a side issue. 
What</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>user reads 
at what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>data is 
a secondary issue. The principal wrong here is that</em></ins></span>
-    the <span class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of</strong></del></span> <span 
class="inserted"><ins><em>company gets that</em></ins></span> data <span 
class="removed"><del><strong>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed to check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>at all.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and 
WeatherBug,</em></ins></span> are
-  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>tracking people's 
locations.&lt;/p&gt;</em></ins></span> 
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span>
+&lt;li&gt;&lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because</strong></del></span>
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span class="removed"><del><strong>system 
has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>Nissan has no
-    access.  The software in</strong></del></span>
-    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the <span class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith</strong></del></span> <span 
class="inserted"><ins><em>obtains</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car 
remotely,</strong></del></span> the <span class="removed"><del><strong>cell 
phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>same 
machine via
-    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>phone company to 
track</strong></del></span> <span class="inserted"><ins><em>user's activities 
in</em></ins></span> the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>app; others only say 
that</em></ins></span> the <span class="removed"><del><strong>time; 
it</strong></del></span> <span class="inserted"><ins><em>user</em></ins></span> 
is <span class="removed"><del><strong>possible to physically remove the cell 
phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which</strong></del></span>
-    <span class="inserted"><ins><em>using that app, but that 
alone</em></ins></span> is <span class="removed"><del><strong>made available to 
car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
+    report</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's actions to 
Facebook&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>often quite informative.&lt;/p&gt;
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article, is not
-      really</strong></del></span> <span class="inserted"><ins><em>whether the 
user has</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>Facebook
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810244"&gt;
     &lt;p&gt;Some Android apps &lt;a
     
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These 
systems</strong></del></span> <span class="inserted"><ins><em>users that have 
deleted them&lt;/a&gt;.&lt;/p&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
@@ -1466,229 +1347,118 @@
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There</em></ins></span> are <span class="removed"><del><strong>an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. 
The</strong></del></span> other
-      <span class="removed"><del><strong>cases mentioned are 
done</strong></del></span> <span class="inserted"><ins><em>kinds of location
-    tracking, but most users will be tricked</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>user's 
movements</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company 
says</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But I can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to snoop</em></ins></span>
-    and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40% of</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> were <span 
class="removed"><del><strong>programmed</strong></del></span>
-    <span class="inserted"><ins><em>found</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke:</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.</em></ins></span>  The other <span 
class="removed"><del><strong>day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping
-    in</em></ins></span> other <span class="removed"><del><strong>way.&rdquo; 
Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ways.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>is evidence</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>proprietary apps generally work against
+    &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
-    need</em></ins></span> to get <span class="removed"><del><strong>users' 
formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>rid 
of</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
-    Android by &lt;a 
href="https://replicant.us"&gt;switching</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
-    and</em></ins></span> the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps from the free 
software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="removed"><del><strong>TVs 
are not allowed to report what</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>if 
an app contains anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+  &lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed</em></ins></span> so that <span 
class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info</em></ins></span> to 
<span class="removed"><del><strong>turn this off,</strong></del></span> <span 
class="inserted"><ins><em>each
-    other</em></ins></span> but <span class="removed"><del><strong>having it 
enabled by default
-      is an injustice already.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible sounds to be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>dis-service
-    spy</em></ins></span> on <span class="removed"><del><strong>other devices 
in
-      range so as to determine that</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. It &lt;a
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where</em></ins></span> they <span class="removed"><del><strong>are 
nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>travel before</em></ins></span> and
-      <span class="removed"><del><strong>other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>after going to a movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+  &lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software in popular Android apps
-    is pervasive</em></ins></span> and <span 
class="inserted"><ins><em>sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user's 
movements around a physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads</em></ins></span> all <span class="inserted"><ins><em>phone 
numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>words
+    is pervasive and sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store by noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app &lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;</em></ins></span>
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls</em></ins></span> and <span class="removed"><del><strong>would then 
have to
-      give it</strong></del></span> <span class="inserted"><ins><em>sent them 
and text messages and emails</em></ins></span> to <span 
class="removed"><del><strong>the US or some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google did</em></ins></span> not <span 
class="inserted"><ins><em>intend</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless</strong></del></span> <span 
class="inserted"><ins><em>make these apps spy; on the 
contrary,</em></ins></span> it <span class="removed"><del><strong>is done
-    by free software in your own computer.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>worked</em></ins></span> in
-      <span class="removed"><del><strong>&lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports</strong></del></span> <span 
class="inserted"><ins><em>various ways to prevent that, and deleted these apps 
after
-    discovering</em></ins></span> what <span class="inserted"><ins><em>they 
did. So we cannot blame Google specifically
-    for</em></ins></span> the <span class="removed"><del><strong>user 
watches,</strong></del></span> <span class="inserted"><ins><em>snooping of 
these apps.&lt;/p&gt;
-
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android 
apps,</em></ins></span> and
-    <span class="inserted"><ins><em>therefore shares in</em></ins></span> the 
<span class="removed"><del><strong>switch to turn this off has no effect.  (The 
fact that</strong></del></span> <span class="inserted"><ins><em>responsibility 
for</em></ins></span> the
-      <span class="removed"><del><strong>transmission 
reports</strong></del></span> <span class="inserted"><ins><em>injustice of 
their being
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for the snooping of these apps.&lt;/p&gt;
+
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>404 error really means nothing; the 
server</strong></del></span> <span class="inserted"><ins><em>better job of 
preventing apps from
+    &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google</em></ins></span> could <span 
class="removed"><del><strong>save that data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>demand</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps, and study
+    &lt;p&gt;Google could demand the source code for these apps, and study
     the source code somehow to determine whether they mistreat users in
-    various ways. If</em></ins></span> it <span 
class="removed"><del><strong>had installed</strong></del></span> <span 
class="inserted"><ins><em>did</em></ins></span> a <span 
class="removed"><del><strong>patch to stop</strong></del></span> <span 
class="inserted"><ins><em>good job of</em></ins></span> this, <span 
class="removed"><del><strong>but any product</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> could <span 
class="removed"><del><strong>spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> <span class="inserted"><ins><em>more or less
+    various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>spying anyway&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span> <span class="inserted"><ins><em>source 
code</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the
-    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- #SpywareAtPlay --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;</em></ins></span>
-    snoop on <span class="removed"><del><strong>their</strong></del></span> 
<span class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps,</em></ins></span> users <span 
class="removed"><del><strong>and report</strong></del></span> <span 
class="inserted"><ins><em>could &lt;em&gt;make sure&lt;/em&gt; that they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
@@ -1704,20 +1474,13 @@
   &lt;li id="M201704260"&gt;
     &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands</em></ins></span> to <span 
class="inserted"><ins><em>personal data in</em></ins></span> the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing</em></ins></span> a <span class="removed"><del><strong>wide 
range of data about their users and</strong></del></span> <span 
class="inserted"><ins><em>spyware app for its headphones&lt;/a&gt;.  
Specifically,
+  &lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for &lt;a
+    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
     the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
@@ -2283,7 +2046,8 @@
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
     passes by, the user's front door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>to let 
individual employees look
     at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
@@ -2293,11 +2057,14 @@
     &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
     
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
     give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>&ldquo;clean&rdquo; 
Windows install is</strong></del></span> <span class="inserted"><ins><em>better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
+    manufacturers promise</em></ins></span> not <span 
class="removed"><del><strong>really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span> <span class="inserted"><ins><em>to look at 
what's</em></ins></span> in <span class="removed"><del><strong>its own 
malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>the videos. That's not
     security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
@@ -2315,11 +2082,14 @@
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span>
 
-&lt;div class="big-subsection"&gt;
+
+<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -2349,140 +2119,245 @@
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
+    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure to place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>statements 
about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but</em></ins></span> it <span class="removed"><del><strong>through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data 
to a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
     the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>access the 
data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+  &lt;li id="M201612060"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>Nest 
Cam</strong></del></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
     company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    crackers to listen in on a child's speech, and</em></ins></span> even 
<span class="removed"><del><strong>when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>speak into</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span>
+    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to <span class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy 
on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    to snoop</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span 
class="removed"><del><strong>e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
-    it to Amazon's servers, which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, &lt;a
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
+    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
+    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
+    even if <span class="removed"><del><strong>it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
     
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    the data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>accessed by
     advertising companies and government agencies. In other words,
-    deleting the collected information doesn't cancel the wrong of
+    deleting</em></ins></span> the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;
+    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to
+    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
+    at home, not only in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>past 
(and, who knows,
+    in</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
     recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &lt;p&gt;Since the client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user is still
+    paying for the subscription,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
     specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use of ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;
+    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
+      really</strong></del></span>
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
+      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
+    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
+    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done</strong></del></span> <span class="inserted"><ins><em>US
     told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
@@ -2494,29 +2369,51 @@
   &lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+    offers a gratis electronic toothbrush that snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>malware. The other
+      cases mentioned</strong></del></span>
+    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>car's location 
at</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Today's technological practice does not include any way of making
+    &lt;p&gt;Today's technological practice does not include</em></ins></span> 
any <span class="removed"><del><strong>time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>way of making
     a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
+    on you.  Even</em></ins></span> if <span class="removed"><del><strong>the 
state orders</strong></del></span> it <span class="removed"><del><strong>to get 
the data
+      and hand</strong></del></span> <span class="inserted"><ins><em>is 
air-gapped,</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>could be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407170"&gt;
     &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;
+    data about</em></ins></span> the <span class="removed"><del><strong>state 
can store it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201310260"&gt;
-    &lt;p&gt;&lt;a
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
+    &lt;p&gt;&lt;a</em></ins></span>
     
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
     Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2524,17 +2421,39 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
-    &lt;p&gt;Tommy Hilfiger clothing &lt;a
-    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span class="removed"><del><strong>shows that laws requiring 
products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the 
TV</strong></del></span> will
+      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>teach the sheeple to find it normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2544,18 +2463,36 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
+    that <span class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
+    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else and to transmit conversations
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
+    to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>report its 
location</em></ins></span> to <span class="removed"><del><strong>be
+      picked up by proprietary malware running on other devices in
+      range so as</strong></del></span> <span 
class="inserted"><ins><em>someone else and</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2568,18 +2505,20 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
-    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and
+      <span class="removed"><del><strong>other</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
     when they go to a junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;
+    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
-  &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
     near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
     connected to the cellular phone network and sends Ford a lot of data,
-    including car location. This feature operates even when the ignition
+    including car location. This feature operates</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
@@ -2588,88 +2527,133 @@
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
-    &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with a terminal that &lt;a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    &lt;p&gt;In China,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>is mandatory for electric
+    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
     to a government-run platform&lt;/a&gt;. In practice, &lt;a
     href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
-    manufacturers collect this data&lt;/a&gt; as part of</em></ins></span> 
their <span class="inserted"><ins><em>own spying, then
-    forward it to the government-run platform.&lt;/p&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201810230"&gt;
-    &lt;p&gt;GM &lt;a
-    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked the choices of radio programs&lt;/a&gt; in its
+  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get</em></ins></span> users' 
-      <span class="removed"><del><strong>friends</strong></del></span> <span 
class="inserted"><ins><em>consent, but it could have got that easily by
-    sneaking it into the contract that users sign for some digital service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="inserted"><ins><em>you,
     watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection 
should</em></ins></span> be <span class="removed"><del><strong>trusted unless 
it</strong></del></span> <span class="inserted"><ins><em>forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the 
software</em></ins></span>
+    is <span class="removed"><del><strong>done
+    by</strong></del></span> free <span class="removed"><del><strong>software 
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't 
collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+    track</em></ins></span> your <span class="removed"><del><strong>own 
computer.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>every 
move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201607160"&gt;
     &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
     
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-    snooping devices&lt;/a&gt;.&lt;/p&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  &lt;li id="M201602240"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
+    access its computers remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to</em></ins></span> do <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>because the system has no authentication
-    when accessed</em></ins></span> through <span 
class="removed"><del><strong>ad networks</strong></del></span> <span 
class="inserted"><ins><em>the modem.  However, even if it asked
-    for authentication, you couldn't be confident</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>Nissan
-    has no access.  The software in the car is proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
+    &lt;p&gt;That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software</em></ins></span> in <span 
class="inserted"><ins><em>the car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
-    enables the phone company to track the car's movements all the time;
-    it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
+    &lt;p&gt;Even if no one connects to</em></ins></span> the <span 
class="removed"><del><strong>user watches, and</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
+    enables</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>phone company</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The fact that the
+      transmission reports a 404 error really means 
nothing;</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> the <span 
class="removed"><del><strong>server
+      could save that data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>car's movements all</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>time;</em></ins></span>
+    it <span class="removed"><del><strong>had installed a 
patch</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span class="removed"><del><strong>stop this, but 
any product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow the company</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company to extract
-    data remotely and determine the car's location
-    at any time. (See Section 2, paragraphs b and c of the &lt;a
+&lt;!-- #SpywareAtPlay --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>extract
+    data remotely and determine the car's location</em></ins></span>
+    at <span class="removed"><del><strong>Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users</strong></del></span> <span 
class="inserted"><ins><em>any time. (See Section 2, paragraphs 
b</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
     privacy statement&lt;/a&gt;.) The company says it doesn't store this
-    information, but if the state orders it to get the data and hand it
-    over, the state can store it.&lt;/p&gt;
+    information, but if the state orders it</em></ins></span> to <span 
class="inserted"><ins><em>get</em></ins></span> the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> and <span 
class="removed"><del><strong>you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201303250"&gt;
-    &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
-    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which is made
-    available to car manufacturers, insurance companies, and others.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201303250"&gt;
+    &lt;p id="records-drivers"&gt;Proprietary software in 
cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+    records information</em></ins></span> about <span 
class="removed"><del><strong>their users</strong></del></span> <span 
class="inserted"><ins><em>drivers' movements&lt;/a&gt;, which is made
+    available to car manufacturers, insurance companies,</em></ins></span> and 
<span class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span 
class="inserted"><ins><em>others.&lt;/p&gt;
 
     &lt;p&gt;The case of toll-collection systems, mentioned in this article,
     is not really a matter of proprietary surveillance. These systems
-    are an intolerable invasion of privacy, and should be replaced with
+    are an intolerable invasion of privacy,</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced 
with
     anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>data
       collected</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done</em></ins></span> by <span class="removed"><del><strong>various 
cr&hellip;apps and sites made</strong></del></span> <span 
class="inserted"><ins><em>malware. The
     other cases mentioned are done</em></ins></span> by <span 
class="removed"><del><strong>different 
@@ -3086,7 +3070,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/02 17:01:06 $
+$Date: 2019/06/07 08:33:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- proprietary-surveillance.ja.po      2 Jun 2019 17:01:06 -0000       1.277
+++ proprietary-surveillance.ja.po      7 Jun 2019 08:33:54 -0000       1.278
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -993,6 +993,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing.";
 "net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
 "cr&hellip;apps spy on users</a>, because this would require circumventing "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary-surveillance.pot        2 Jun 2019 17:01:06 -0000       1.225
+++ proprietary-surveillance.pot        7 Jun 2019 08:33:54 -0000       1.226
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -658,6 +658,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a "
+"href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\";> track "
+"iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The DMCA and the EU Copyright Directive make it <a "
 "href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\";> "
 "illegal to study how iOS cr&hellip;apps spy on users</a>, because this would "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.531
retrieving revision 1.532
diff -u -b -r1.531 -r1.532
--- proprietary-surveillance.ru.po      2 Jun 2019 18:59:53 -0000       1.531
+++ proprietary-surveillance.ru.po      7 Jun 2019 08:33:54 -0000       1.532
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -891,6 +892,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing.";
 "net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
 "cr&hellip;apps spy on users</a>, because this would require circumventing "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.de-diff.html    1 Jun 2019 17:31:29 -0000       1.96
+++ proprietary.de-diff.html    7 Jun 2019 08:33:54 -0000       1.97
@@ -46,13 +46,13 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -128,9 +128,9 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -161,10 +161,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -186,6 +186,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can &lt;a
+    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said to be
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
+    Apple or from governments that can command Apple's obedience (such
+    as the US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -239,17 +250,6 @@
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
-    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
-    the company made them all cease to work&lt;/a&gt; by shutting down that
-    server.&lt;/p&gt;
-
-    &lt;p&gt;The shutdown might ironically be good for their users, since the
-    product was designed to manipulate people by presenting a phony
-    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary.de.po   1 Jun 2019 17:31:29 -0000       1.138
+++ proprietary.de.po   7 Jun 2019 08:33:54 -0000       1.139
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -439,6 +439,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -503,20 +516,6 @@
 "\"> near-complete control</a> over the phone."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.es.po   3 Jun 2019 08:37:49 -0000       1.170
+++ proprietary.es.po   7 Jun 2019 08:33:54 -0000       1.171
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -303,6 +304,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -406,27 +420,6 @@
 "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">control casi "
 "total</a> del teléfono."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-"Los robots de juguete Jibo robot estaban conectados al servidor del "
-"fabricante. La empresa cerró el servidor e <a href=\"https://www.apnews.";
-"com/99c9ec8ebad242ca88178e22c7642648\">hizo que todos dejaran de funcionar</"
-"a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-"Irónicamente, el cierre del servidor pudo ser beneficioso para los usuarios, 
"
-"ya que el producto estaba diseñado para manipular a la gente simulando "
-"emociones, y casi con toda seguridad los estaba espiando."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,6 +499,25 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
+#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
+#~ "company made them all cease to work</a> by shutting down that server."
+#~ msgstr ""
+#~ "Los robots de juguete Jibo robot estaban conectados al servidor del "
+#~ "fabricante. La empresa cerró el servidor e <a href=\"https://www.apnews.";
+#~ "com/99c9ec8ebad242ca88178e22c7642648\">hizo que todos dejaran de "
+#~ "funcionar</a>."
+
+#~ msgid ""
+#~ "The shutdown might ironically be good for their users, since the product "
+#~ "was designed to manipulate people by presenting a phony semblance of "
+#~ "emotions, and was most certainly spying on them."
+#~ msgstr ""
+#~ "Irónicamente, el cierre del servidor pudo ser beneficioso para los "
+#~ "usuarios, ya que el producto estaba diseñado para manipular a la gente "
+#~ "simulando emociones, y casi con toda seguridad los estaba espiando."
+
+#~ msgid ""
 #~ "The FordPass Connect feature of some Ford vehicles has <a href=\"https://";
 #~ "www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> "
 #~ "near-complete access to the internal car network</a>. It is constantly "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.210
retrieving revision 1.211
diff -u -b -r1.210 -r1.211
--- proprietary.fr.po   1 Jun 2019 18:14:56 -0000       1.210
+++ proprietary.fr.po   7 Jun 2019 08:33:54 -0000       1.211
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2019-06-01 20:13+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -299,6 +300,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -401,25 +415,6 @@
 "comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
 "\">contrôle presque complet</a> du téléphone."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-"Les robots-jouets Jibo dépendaient du serveur du fabricant. Ce dernier ayant 
"
-"arrêté son serveur, les robots sont devenus inutilisables."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-"Paradoxalement, cette fermeture pourrait être bonne pour les utilisateurs, "
-"car ce produit était conçu pour manipuler les gens en simulant des 
émotions "
-"et très certainement les espionnait."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -493,3 +488,20 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
+#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
+#~ "company made them all cease to work</a> by shutting down that server."
+#~ msgstr ""
+#~ "Les robots-jouets Jibo dépendaient du serveur du fabricant. Ce dernier "
+#~ "ayant arrêté son serveur, les robots sont devenus inutilisables."
+
+#~ msgid ""
+#~ "The shutdown might ironically be good for their users, since the product "
+#~ "was designed to manipulate people by presenting a phony semblance of "
+#~ "emotions, and was most certainly spying on them."
+#~ msgstr ""
+#~ "Paradoxalement, cette fermeture pourrait être bonne pour les "
+#~ "utilisateurs, car ce produit était conçu pour manipuler les gens en "
+#~ "simulant des émotions et très certainement les espionnait."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary.it-diff.html    1 Jun 2019 17:31:29 -0000       1.108
+++ proprietary.it-diff.html    7 Jun 2019 08:33:54 -0000       1.109
@@ -45,8 +45,8 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
@@ -160,10 +160,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -185,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can &lt;a
+    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said to be
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
+    Apple or from governments that can command Apple's obedience (such
+    as the US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -238,17 +249,6 @@
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
-    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
-    the company made them all cease to work&lt;/a&gt; by shutting down that
-    server.&lt;/p&gt;
-
-    &lt;p&gt;The shutdown might ironically be good for their users, since the
-    product was designed to manipulate people by presenting a phony
-    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -309,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary.it.po   1 Jun 2019 17:31:29 -0000       1.147
+++ proprietary.it.po   7 Jun 2019 08:33:54 -0000       1.148
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -507,20 +520,6 @@
 "\"> near-complete control</a> over the phone."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.ja-diff.html    1 Jun 2019 17:31:29 -0000       1.109
+++ proprietary.ja-diff.html    7 Jun 2019 08:33:54 -0000       1.110
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -182,6 +182,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can &lt;a
+    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said to be
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
+    Apple or from governments that can command Apple's obedience (such
+    as the US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -235,17 +246,6 @@
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
-    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
-    the company made them all cease to work&lt;/a&gt; by shutting down that
-    server.&lt;/p&gt;
-
-    &lt;p&gt;The shutdown might ironically be good for their users, since the
-    product was designed to manipulate people by presenting a phony
-    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -306,7 +306,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.ja.po   1 Jun 2019 17:31:29 -0000       1.130
+++ proprietary.ja.po   7 Jun 2019 08:33:54 -0000       1.131
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -361,6 +361,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -425,20 +438,6 @@
 "\"> near-complete control</a> over the phone."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary.nl-diff.html    1 Jun 2019 17:31:29 -0000       1.108
+++ proprietary.nl-diff.html    7 Jun 2019 08:33:54 -0000       1.109
@@ -45,8 +45,8 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
@@ -160,10 +160,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -185,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can &lt;a
+    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said to be
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
+    Apple or from governments that can command Apple's obedience (such
+    as the US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -238,17 +249,6 @@
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
-    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
-    the company made them all cease to work&lt;/a&gt; by shutting down that
-    server.&lt;/p&gt;
-
-    &lt;p&gt;The shutdown might ironically be good for their users, since the
-    product was designed to manipulate people by presenting a phony
-    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -309,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.nl.po   1 Jun 2019 17:31:29 -0000       1.119
+++ proprietary.nl.po   7 Jun 2019 08:33:54 -0000       1.120
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -500,20 +513,6 @@
 "\"> near-complete control</a> over the phone."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary.pl-diff.html    1 Jun 2019 17:31:29 -0000       1.126
+++ proprietary.pl-diff.html    7 Jun 2019 08:33:54 -0000       1.127
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 450 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>April, 2019, the pages in this directory list 
around 400
+instances of malicious functionalities (with more than 450 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -128,17 +128,17 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -183,6 +183,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can &lt;a
+    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said to be
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
+    Apple or from governments that can command Apple's obedience (such
+    as the US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -236,17 +247,6 @@
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
-    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
-    the company made them all cease to work&lt;/a&gt; by shutting down that
-    server.&lt;/p&gt;
-
-    &lt;p&gt;The shutdown might ironically be good for their users, since the
-    product was designed to manipulate people by presenting a phony
-    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -307,7 +307,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary.pl.po   1 Jun 2019 17:31:29 -0000       1.114
+++ proprietary.pl.po   7 Jun 2019 08:33:54 -0000       1.115
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -583,20 +596,6 @@
 "\"> near-complete control</a> over the phone."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary.pot     1 Jun 2019 17:31:29 -0000       1.111
+++ proprietary.pot     7 Jun 2019 08:33:54 -0000       1.112
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a "
+"href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\";> track "
+"iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a "
 
"href=\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners\";>
 "
 "tool for propaganda</a> by natalist Christians.  It spreads distrust for "
@@ -311,20 +325,6 @@
 "near-complete control</a> over the phone."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a "
-"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
-"company made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.pt-br.po        1 Jun 2019 17:31:29 -0000       1.170
+++ proprietary.pt-br.po        7 Jun 2019 08:33:54 -0000       1.171
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2019-05-20 00:20-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -297,6 +297,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -376,26 +389,6 @@
 "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> controle quase "
 "completo</a> sobre seu telefone."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-"Os brinquedos do robô Jibo foram amarrados ao servidor do fabricante, e <a "
-"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> a empresa "
-"fez com que todos parassem de funcionar</a> desligando o servidor."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-"O desligamento pode, ironicamente, ser bom para seus usuários, já que o "
-"produto foi projetado para manipular as pessoas, apresentando uma aparência "
-"falsa de emoções, e certamente estava espionando elas."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -471,6 +464,24 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
+#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
+#~ "company made them all cease to work</a> by shutting down that server."
+#~ msgstr ""
+#~ "Os brinquedos do robô Jibo foram amarrados ao servidor do fabricante, e "
+#~ "<a href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> a "
+#~ "empresa fez com que todos parassem de funcionar</a> desligando o servidor."
+
+#~ msgid ""
+#~ "The shutdown might ironically be good for their users, since the product "
+#~ "was designed to manipulate people by presenting a phony semblance of "
+#~ "emotions, and was most certainly spying on them."
+#~ msgstr ""
+#~ "O desligamento pode, ironicamente, ser bom para seus usuários, já que o "
+#~ "produto foi projetado para manipular as pessoas, apresentando uma "
+#~ "aparência falsa de emoções, e certamente estava espionando elas."
+
+#~ msgid ""
 #~ "The FordPass Connect feature of some Ford vehicles has <a href=\"https://";
 #~ "www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> "
 #~ "near-complete access to the internal car network</a>. It is constantly "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary.ru.po   1 Jun 2019 18:29:32 -0000       1.246
+++ proprietary.ru.po   7 Jun 2019 08:33:54 -0000       1.247
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -405,27 +419,6 @@
 "bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> 
почти "
 "полностью контролирует</a> телефон."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-"Роботы-игрушки Jibo были привязаны к 
серверу производителя, и <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> компания 
"
-"заставила всех их прекратить работу</a>, 
выключив этот сервер."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-"Как ни парадоксально, это выключение, 
возможно, принесло пользователям "
-"добро, потому что продукт был 
спроектирован так, чтобы манипулировать "
-"пользователями, представляя фальшивую 
видимость эмоций, и уж наверняка "
-"шпионил за ними."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -505,6 +498,25 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
+#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
+#~ "company made them all cease to work</a> by shutting down that server."
+#~ msgstr ""
+#~ "Роботы-игрушки Jibo были привязаны к 
серверу производителя, и <a href="
+#~ "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> 
компания "
+#~ "заставила всех их прекратить работу</a>, 
выключив этот сервер."
+
+#~ msgid ""
+#~ "The shutdown might ironically be good for their users, since the product "
+#~ "was designed to manipulate people by presenting a phony semblance of "
+#~ "emotions, and was most certainly spying on them."
+#~ msgstr ""
+#~ "Как ни парадоксально, это выключение, 
возможно, принесло пользователям "
+#~ "добро, потому что продукт был 
спроектирован так, чтобы манипулировать "
+#~ "пользователями, представляя фальшивую 
видимость эмоций, и уж наверняка "
+#~ "шпионил за ними."
+
+#~ msgid ""
 #~ "The FordPass Connect feature of some Ford vehicles has <a href=\"https://";
 #~ "www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> "
 #~ "near-complete access to the internal car network</a>. It is constantly "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.zh-tw-diff.html 1 Jun 2019 17:31:29 -0000       1.86
+++ proprietary.zh-tw-diff.html 7 Jun 2019 08:33:54 -0000       1.87
@@ -46,13 +46,13 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -128,9 +128,9 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -161,10 +161,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -186,6 +186,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201906030"&gt;
+    &lt;p&gt;Apple can &lt;a
+    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said to be
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
+    Apple or from governments that can command Apple's obedience (such
+    as the US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -239,17 +250,6 @@
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
-    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
-    the company made them all cease to work&lt;/a&gt; by shutting down that
-    server.&lt;/p&gt;
-
-    &lt;p&gt;The shutdown might ironically be good for their users, since the
-    product was designed to manipulate people by presenting a phony
-    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.zh-tw.po        1 Jun 2019 17:31:29 -0000       1.97
+++ proprietary.zh-tw.po        7 Jun 2019 08:33:54 -0000       1.98
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -414,20 +427,6 @@
 "\"> near-complete control</a> over the phone."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- pt-br.po    2 Jun 2019 17:01:06 -0000       1.120
+++ pt-br.po    7 Jun 2019 08:33:54 -0000       1.121
@@ -1140,6 +1140,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- ru.po       2 Jun 2019 19:29:44 -0000       1.202
+++ ru.po       7 Jun 2019 08:33:54 -0000       1.203
@@ -1470,6 +1470,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- zh-tw.po    2 Jun 2019 17:01:06 -0000       1.92
+++ zh-tw.po    7 Jun 2019 08:33:54 -0000       1.93
@@ -1098,6 +1098,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]