www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Mon, 10 Jun 2019 05:02:24 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/06/10 05:02:22

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.ru.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.439&r2=1.440
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.533&r2=1.534
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.94&r2=1.95

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- de.po       8 Jun 2019 08:31:12 -0000       1.95
+++ de.po       10 Jun 2019 09:02:19 -0000      1.96
@@ -1733,6 +1733,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- es.po       9 Jun 2019 11:02:28 -0000       1.129
+++ es.po       10 Jun 2019 09:02:19 -0000      1.130
@@ -1528,6 +1528,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- fr.po       8 Jun 2019 16:55:38 -0000       1.165
+++ fr.po       10 Jun 2019 09:02:20 -0000      1.166
@@ -1485,6 +1485,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- it.po       8 Jun 2019 08:31:13 -0000       1.95
+++ it.po       10 Jun 2019 09:02:20 -0000      1.96
@@ -1718,6 +1718,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- ja.po       8 Jun 2019 08:31:13 -0000       1.94
+++ ja.po       10 Jun 2019 09:02:20 -0000      1.95
@@ -1467,6 +1467,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-apple.de-diff.html  7 Jun 2019 08:33:53 -0000       1.35
+++ malware-apple.de-diff.html  10 Jun 2019 09:02:20 -0000      1.36
@@ -659,114 +659,114 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;iTunes videos have DRM,</strong></del></span> <span 
class="inserted"><ins><em>id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-&lt;p&gt;These are situations in</em></ins></span> which <span 
class="removed"><del><strong>allows</strong></del></span> Apple <span 
class="inserted"><ins><em>employs its power over users</em></ins></span>
-to <span class="inserted"><ins><em>directly intervene in ways that harm them 
or block their work.&lt;/p&gt;
+&lt;p&gt;These are situations in</em></ins></span> which <span 
class="removed"><del><strong>allows</strong></del></span> Apple <span 
class="inserted"><ins><em>employs its power over users
+to directly intervene in ways that harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201810240"&gt;
-    &lt;p&gt;Apple and Samsung deliberately</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its customers can
-  watch</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
-    the <span class="removed"><del><strong>videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>performance of older phones to force users to buy 
their newer
-    phones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Apple and Samsung deliberately &lt;a
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones</em></ins></span> to <span 
class="inserted"><ins><em>force users to buy their newer
+    phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The DMCA and the EU 
Copyright Directive make it</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201805310"&gt;
+  &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span>
+  <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
+    Telegram from upgrading</em></ins></span> its <span 
class="removed"><del><strong>customers can
+  watch the videos</strong></del></span> <span class="inserted"><ins><em>app 
for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command</em></ins></span> 
to <span class="removed"><del><strong>study how iOS cr...apps spy on 
users&lt;/a&gt;, because this
-      would require circumventing the iOS DRM.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
+    Telegram in Russia.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a
-  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</strong></del></span>
 Apple <span class="removed"><del><strong>uses DRM 
software</strong></del></span> to <span class="removed"><del><strong>prevent 
people from charging an iThing with a 
-  generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    are jails&lt;/a&gt;,</em></ins></span> they <span 
class="removed"><del><strong>purchased&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>don't permit any app to be free 
software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;&lt;a
-  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-  DRM (digital restrictions mechanisms)</strong></del></span> <span 
class="inserted"><ins><em>block
-    Telegram</em></ins></span> in <span 
class="removed"><del><strong>MacOS&lt;/a&gt;. This article
-  focuses</strong></del></span> <span 
class="inserted"><ins><em>Russia.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
DMCA</strong></del></span>
 
-    &lt;p&gt;The Telegram client is free software on other platforms, but 
not</em></ins></span> on
-    <span class="inserted"><ins><em>iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
-    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201710044"&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot 
drives,</em></ins></span> and <span class="removed"><del><strong>the EU 
Copyright Directive make it</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    changes</em></ins></span> the <span class="removed"><del><strong>iOS 
DRM.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>file 
system from HFS+  to APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of 
MacOS.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
-    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes</em></ins></span> the <span class="removed"><del><strong>fact that 
a new model</strong></del></span> <span class="inserted"><ins><em>file system 
from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions</em></ins></span> 
of <span class="removed"><del><strong>Macbook introduced a 
requirement</strong></del></span> <span 
class="inserted"><ins><em>MacOS.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a
+  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</strong></del></span>
 
-  &lt;li id="M201706060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201706060"&gt;
     &lt;p&gt;Apple will stop &lt;a
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
-    bugs</em></ins></span> for <span class="removed"><del><strong>monitors to 
have malicious hardware, but DRM software in MacOS is
-  involved in activating</strong></del></span> <span 
class="inserted"><ins><em>older model iThings&lt;/a&gt;.&lt;/p&gt;
+    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's</em></ins></span> the <span class="removed"><del><strong>hardware. 
The software for accessing iTunes
-  is also responsible.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nature of proprietary 
software.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;Meanwhile,</em></ins></span> Apple <span 
class="removed"><del><strong>uses DRM software to prevent</strong></del></span> 
<span class="inserted"><ins><em>stops</em></ins></span> people from <span 
class="removed"><del><strong>charging an iThing with a 
+  generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;</strong></del></span>
 <span class="inserted"><ins><em>fixing problems themselves;
+    that's the nature of proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201704070"&gt;
+  &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains</em></ins></span> DRM <span 
class="removed"><del><strong>that caters</strong></del></span> <span 
class="inserted"><ins><em>specifically designed</em></ins></span> to <span 
class="removed"><del><strong>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
-  and said that MacOS would do</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    iPhone 7 contains</em></ins></span> DRM <span 
class="removed"><del><strong>(digital restrictions mechanisms) in 
MacOS&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>specifically designed to &lt;a
     
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The article uses</em></ins></span> the <span 
class="removed"><del><strong>same thing subsequently.)&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
-
-&lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS,</strong></del></span> <span class="inserted"><ins><em>term 
&ldquo;lock&rdquo;
-    to describe</em></ins></span> the <span 
class="removed"><del><strong>operating system of</strong></del></span> <span 
class="inserted"><ins><em>DRM, but we prefer to use</em></ins></span> the <span 
class="removed"><del><strong>Apple iThings, is</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
+    &lt;p&gt;The</em></ins></span> article
+  <span class="removed"><del><strong>focuses on</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>fact that a new model of Macbook introduced a 
requirement
+  for monitors</strong></del></span> <span class="inserted"><ins><em>term 
&ldquo;lock&rdquo;</em></ins></span>
+    to <span class="removed"><del><strong>have malicious 
hardware,</strong></del></span> <span class="inserted"><ins><em>describe the 
DRM,</em></ins></span> but <span class="removed"><del><strong>DRM software in 
MacOS is
+  involved in activating</strong></del></span> <span 
class="inserted"><ins><em>we prefer to use</em></ins></span> the <span 
class="removed"><del><strong>hardware. The software for accessing iTunes
+  is also responsible.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
-    handcuffs&lt;/a&gt;.&lt;/p&gt;
+    handcuffs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201606080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
+  and said that MacOS would do</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-    stops users from fixing</em></ins></span> the <span 
class="removed"><del><strong>prototype
-of a jail&lt;/a&gt;.  It was</strong></del></span> <span 
class="inserted"><ins><em>security bugs in Quicktime for Windows&lt;/a&gt;,
+    stops users from fixing</em></ins></span> the <span 
class="removed"><del><strong>same thing subsequently.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+
+&lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
+iOS,</strong></del></span> <span class="inserted"><ins><em>security bugs in 
Quicktime for Windows&lt;/a&gt;,
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605040"&gt;
-    &lt;p&gt;The</em></ins></span> Apple <span 
class="removed"><del><strong>that introduced</strong></del></span> <span 
class="inserted"><ins><em>Music client program &lt;a
+    &lt;p&gt;The Apple Music client program &lt;a
     
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
-    the <span class="removed"><del><strong>practice of
-designing general purpose computers with censorship of application
-programs.&lt;/p&gt;
-
-&lt;p&gt;Here is</strong></del></span> <span class="inserted"><ins><em>user's 
file system for music files, copies them to</em></ins></span> an <span 
class="removed"><del><strong>article about the</strong></del></span> <span 
class="inserted"><ins><em>Apple server,
+    the <span class="removed"><del><strong>operating</strong></del></span> 
<span class="inserted"><ins><em>user's file</em></ins></span> system <span 
class="removed"><del><strong>of the</strong></del></span> <span 
class="inserted"><ins><em>for music files, copies them to an</em></ins></span> 
Apple <span class="removed"><del><strong>iThings, is the prototype
+of a jail&lt;/a&gt;.  It was</strong></del></span> <span 
class="inserted"><ins><em>server,
     and deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602050"&gt;
-    &lt;p&gt;iOS version 9 for iThings</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-code signing&lt;/a&gt; that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    &lt;p&gt;iOS version 9 for iThings &lt;a
+    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from</em></ins></span> the <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
+    Apple&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>that introduced the practice of
+designing general purpose computers with censorship of application
+programs.&lt;/p&gt;
+
+&lt;p&gt;Here is an article about</strong></del></span> <span 
class="inserted"><ins><em>eventually backed off from this policy under
+    criticism from</em></ins></span> the <span 
class="removed"><del><strong>&lt;a
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+code signing&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not 
acknowledged</em></ins></span> that <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -796,8 +796,7 @@
     An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
     unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All</em></ins></span> this <span 
class="removed"><del><strong>freely because they are required to identify
-themselves.</strong></del></span> <span class="inserted"><ins><em>was 
apparently intentional.&lt;/p&gt;
+    censorship&lt;/a&gt;.  All</em></ins></span> this <span 
class="removed"><del><strong>freely because</strong></del></span> <span 
class="inserted"><ins><em>was apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -806,32 +805,52 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://developer.apple.com/xcode/"&gt;Here</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they</em></ins></span> are <span 
class="removed"><del><strong>details&lt;/a&gt;. While 
this</strong></del></span> <span 
class="inserted"><ins><em>suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network</em></ins></span> is <span 
class="removed"><del><strong>a crack in the prison walls,</strong></del></span> 
<span class="inserted"><ins><em>said to be
-    &ldquo;secure,&rdquo; but</em></ins></span> it is <span 
class="removed"><del><strong>not
-big enough to mean that the iThings are no longer jails.&lt;/p&gt;
+    &lt;p&gt;Apple can &lt;a
+    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even when</em></ins></span> they are <span 
class="removed"><del><strong>required</strong></del></span> <span 
class="inserted"><ins><em>suspended&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This distributed bluetooth network is said</em></ins></span> to 
<span class="removed"><del><strong>identify
+themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
+are details&lt;/a&gt;. While this</strong></del></span> <span 
class="inserted"><ins><em>be
+    &ldquo;secure,&rdquo; but it</em></ins></span> is <span 
class="removed"><del><strong>a crack in</strong></del></span> <span 
class="inserted"><ins><em>obviously &lt;em&gt;not&lt;/em&gt; secure from
+    Apple or from governments that can command Apple's obedience (such
+    as the US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM),</em></ins></span> the <span 
class="removed"><del><strong>prison walls,</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+    and DoorDash. But</em></ins></span> it is <span 
class="removed"><del><strong>not
+big enough to mean</strong></del></span> <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="inserted"><ins><em>most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>iThings are no longer jails.&lt;/p&gt;
 
-&lt;h4&gt;Examples of censorship by</strong></del></span> <span 
class="inserted"><ins><em>obviously &lt;em&gt;not&lt;/em&gt; secure 
from</em></ins></span>
-    Apple <span class="removed"><del><strong>jails&lt;/h4&gt;
+&lt;h4&gt;Examples</strong></del></span> <span 
class="inserted"><ins><em>case</em></ins></span> of <span 
class="removed"><del><strong>censorship</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
+    is collected</em></ins></span> by <span class="removed"><del><strong>Apple 
jails&lt;/h4&gt;
 &lt;ul&gt;
   &lt;li&gt;
     &lt;p&gt;Apple &lt;a
       
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
-      deleted several VPNs</strong></del></span> <span 
class="inserted"><ins><em>or</em></ins></span> from <span 
class="removed"><del><strong>its app store for China&lt;/a&gt;, thus using
-      its own censorship power to strengthen</strong></del></span> <span 
class="inserted"><ins><em>governments</em></ins></span> that <span 
class="removed"><del><strong>of</strong></del></span> <span 
class="inserted"><ins><em>can command Apple's obedience (such
-    as</em></ins></span> the <span class="removed"><del><strong>Chinese
-      government.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;</em></ins></span>
+      deleted several VPNs from its app store for China&lt;/a&gt;, thus using
+      its own censorship power to strengthen that of</strong></del></span> the 
<span class="removed"><del><strong>Chinese
+      government.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Apple is &lt;a
+  &lt;li&gt;
+    &lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>company, there</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
       
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
-      censoring apps</strong></del></span>
+      censoring apps</strong></del></span> <span class="inserted"><ins><em>no 
telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201809070"&gt;
+  &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker</em></ins></span> for <span 
class="inserted"><ins><em>MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports</em></ins></span>
     the <span class="removed"><del><strong>US government too&lt;/a&gt;. 
Specifically, it
@@ -1169,7 +1188,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:53 $
+$Date: 2019/06/10 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- malware-apple.de.po 7 Jun 2019 08:33:53 -0000       1.130
+++ malware-apple.de.po 10 Jun 2019 09:02:20 -0000      1.131
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1102,6 +1102,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- malware-apple.es.po 9 Jun 2019 10:40:44 -0000       1.137
+++ malware-apple.es.po 10 Jun 2019 09:02:20 -0000      1.138
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -927,6 +928,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- malware-apple.fr.po 7 Jun 2019 10:26:48 -0000       1.144
+++ malware-apple.fr.po 10 Jun 2019 09:02:20 -0000      1.145
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2019-06-07 12:25+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -929,6 +930,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-apple.it-diff.html  7 Jun 2019 08:33:53 -0000       1.43
+++ malware-apple.it-diff.html  10 Jun 2019 09:02:20 -0000      1.44
@@ -344,125 +344,133 @@
     protect its users from Russian surveillance, and is therefore subject
     to Russian censorship.&lt;/p&gt;
 
-    &lt;p&gt;However, the point here is the wrong of Apple's censorship of
+    &lt;p&gt;However, the point here is the wrong of Apple's <span 
class="removed"><del><strong>censorship of
+apps.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>censorship of
     apps.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Apple</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701050"&gt;
-    &lt;p&gt;Apple</em></ins></span> used its censorship system to enforce 
China's censorship &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
-    by</em></ins></span> blocking distribution of the New York Times <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201701050"&gt;
+    &lt;p&gt;Apple used its censorship system to enforce China's censorship 
&lt;a
+    
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
+    by blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605190"&gt;
-    &lt;p&gt;Apple</em></ins></span> censors games, &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
-    banning</em></ins></span> some games from the cr&hellip;app 
store&lt;/a&gt; because of which
+    &lt;p&gt;Apple censors games, &lt;a
+    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+    banning some games from the cr&hellip;app store&lt;/a&gt; because of which
     political points they suggest. Some political points are apparently
     considered acceptable.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Apple</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+  &lt;li id="M201509290"&gt;
+    &lt;p&gt;Apple &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
     banned a program from the App Store&lt;/a&gt; because its developers
-    committed the enormity of disassembling some <span 
class="removed"><del><strong>iThings.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple rejected an app that displayed the locations of US drone
-assassinations, giving various excuses. Each time the developers
-fixed one &ldquo;problem&rdquo;, Apple complained about another.
-After the fifth rejection,
-Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
-it was censoring the app based on the subject matter&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-As</strong></del></span> <span class="inserted"><ins><em>iThings.&lt;/p&gt;
+    committed the enormity of disassembling some iThings.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509230"&gt;
-    &lt;p&gt;As</em></ins></span> of 2015, Apple &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
-    systematically</em></ins></span> bans apps that endorse abortion rights or 
would help
+    &lt;p&gt;As of 2015, Apple &lt;a
+    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+    systematically bans apps that endorse abortion rights or would help
     women find abortions&lt;/a&gt;.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;
-This</strong></del></span>
-
-    <span class="inserted"><ins><em>&lt;p&gt;This</em></ins></span> particular 
political slant &lt;a
+    &lt;p&gt;This particular political slant &lt;a
     
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects other Apple <span class="removed"><del><strong>services&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
-
-&lt;p&gt;These bugs are/were not intentional, so unlike the rest 
of</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;
+    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506250"&gt;
     &lt;p&gt;Apple has banned iThing
-    applications that show</em></ins></span> the <span 
class="removed"><del><strong>file
-  they do not count</strong></del></span> <span 
class="inserted"><ins><em>confederate flag.  &lt;a
+    applications that show the confederate flag.  &lt;a
     
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
-    Not only those that use it</em></ins></span> as <span 
class="removed"><del><strong>malware. We mention them</strong></del></span> 
<span class="inserted"><ins><em>a symbol of racism&lt;/a&gt;, but even
-    strategic games that use it</em></ins></span> to <span 
class="removed"><del><strong>refute</strong></del></span> <span 
class="inserted"><ins><em>represent confederate army units
-    fighting in</em></ins></span> the
-  <span class="removed"><del><strong>supposition</strong></del></span> <span 
class="inserted"><ins><em>Civil War.&lt;/p&gt;
-
-    &lt;p&gt;This ludicrous rigidity illustrates the point</em></ins></span> 
that <span class="removed"><del><strong>prestigious proprietary software 
doesn't have grave
-  bugs.&lt;/p&gt;
+    Not only those that use it as a symbol of racism&lt;/a&gt;, but even
+    strategic games that use it to represent confederate army units
+    fighting in the Civil War.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API</strong></del></span> 
<span class="inserted"><ins><em>Apple should
-    not be</em></ins></span> allowed <span class="removed"><del><strong>an 
attacker</strong></del></span> to <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application which uses</strong></del></span> <span 
class="inserted"><ins><em>censor apps.  Even if Apple carried 
out</em></ins></span> this <span 
class="removed"><del><strong>API</strong></del></span> <span 
class="inserted"><ins><em>act of
+    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
+    not be allowed to censor apps.  Even if Apple carried out this act of
     censorship with some care, it would still be wrong.  Whether racism
     is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not have the power</em></ins></span> to 
<span class="removed"><del><strong>render
-    a certain kind</strong></del></span> <span 
class="inserted"><ins><em>impose its views
-    about either</em></ins></span> of <span class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these questions, or any 
other.&lt;/p&gt;</em></ins></span>
+    the real issue.  Apple should not have the power to impose its views
+    about either of these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201412110"&gt;
+  &lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power</em></ins></span> in <span 
class="inserted"><ins><em>2014 to &lt;a
-    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the iThings <span 
class="removed"><del><strong>Messages
-      app</strong></del></span> <span class="inserted"><ins><em>for a time.  
It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
-    banned</em></ins></span> a <span class="removed"><del><strong>malicious 
web site to extract all</strong></del></span> <span 
class="inserted"><ins><em>game about growing marijuana&lt;/a&gt;, while 
permitting games
-    about other crimes such as killing people.  Perhaps Apple considers
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+Apple</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405250"&gt;
+    &lt;p&gt;Apple</em></ins></span> used <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> censorship <span 
class="removed"><del><strong>system</strong></del></span> <span 
class="inserted"><ins><em>power in 2014</em></ins></span> to <span 
class="removed"><del><strong>enforce
+China's censorship &lt;a 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by
+blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple censors
+games,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>cr&hellip;app store&lt;/a&gt; because of which 
political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple</strong></del></span> <span class="inserted"><ins><em>iThings for a 
time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;</em></ins></span>
+    banned a <span class="removed"><del><strong>program from the App 
Store&lt;/a&gt; because its developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>game 
about growing marijuana&lt;/a&gt;, while permitting games
+    about other crimes such as killing people.  Perhaps</em></ins></span> 
Apple <span class="inserted"><ins><em>considers
     killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed the locations
+    &lt;p&gt;Apple</em></ins></span> rejected an app that displayed the 
locations
     of US drone assassinations, giving various excuses. Each
     time the developers fixed one &ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection, Apple &lt;a
-    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    complained about another.  After the fifth rejection, Apple &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    admitted</em></ins></span> it was censoring the app based on the subject 
<span class="removed"><del><strong>matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
+rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;
+This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects other Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
+  bugs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which uses this API to render
+    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A bug in the iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+        a malicious web site to extract all the user's messaging 
history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -576,44 +584,42 @@
   &lt;/li&gt;
 
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The Apple Music client
-      program &lt;a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
-      the user's file system for music files, copies them to an Apple
-      server, and deletes them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</em></ins></span>
+    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
     stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
-    while refusing to fix them <span 
class="removed"><del><strong>itself.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;
+    while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201605040"&gt;
-    &lt;p&gt;The Apple Music client program &lt;a
-    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+  &lt;li id="M201605040"&gt;</em></ins></span>
+    &lt;p&gt;The Apple Music client program &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
     the user's file system for music files, copies them to an Apple server,
-    and deletes them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    and deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+stops users from fixing the security bugs in Quicktime for
+      Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201602050"&gt;</em></ins></span>
     &lt;p&gt;iOS version 9 for iThings &lt;a
     
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
     Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from the users. However, it has not acknowledged that this
+    criticism from the users. However, it has not acknowledged that
+    <span class="removed"><del><strong>this was 
wrong.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510020"&gt;
+  &lt;li id="M201510020"&gt;
     &lt;p&gt;Apple forced millions of iThings to &lt;a
     href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
     a system upgrade without asking the users&lt;/a&gt;. Apple did not
@@ -625,10 +631,12 @@
     &lt;p&gt;Apple &lt;a
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
     deleted from iPods the music that users had got from internet music
-    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200709270"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200709270"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</em></ins></span>
     An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
@@ -652,10 +660,27 @@
     track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span class="removed"><del><strong>iPods the 
music that users had got</strong></del></span>
-    <span class="inserted"><ins><em>Apple or</em></ins></span> from <span 
class="removed"><del><strong>internet music
-  stores</strong></del></span> <span 
class="inserted"><ins><em>governments</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can command Apple's obedience (such
-    as the US and China).&lt;/p&gt;</em></ins></span>
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span 
class="removed"><del><strong>iPods</strong></del></span>
+    <span class="inserted"><ins><em>Apple or from governments that can command 
Apple's obedience (such
+    as</em></ins></span> the <span 
class="removed"><del><strong>music</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>users had got from internet music
+  stores</strong></del></span> <span class="inserted"><ins><em>are busy at 
night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1034,7 +1059,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:53 $
+$Date: 2019/06/10 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- malware-apple.it.po 7 Jun 2019 08:33:53 -0000       1.124
+++ malware-apple.it.po 10 Jun 2019 09:02:20 -0000      1.125
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1130,6 +1130,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-apple.ja-diff.html  7 Jun 2019 08:33:53 -0000       1.54
+++ malware-apple.ja-diff.html  10 Jun 2019 09:02:20 -0000      1.55
@@ -325,9 +325,9 @@
 &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
 walls of the iThing jail: users can now install apps built from
 source code, provided the source code is written in Swift.  Users
-cannot do this freely because they are required</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>identify
+cannot do this freely because they are required to identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="inserted"><ins><em>crack in the prison walls, it is not
+are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
 big enough to mean that the iThings are no longer jails.&lt;/p&gt;
 
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
@@ -362,8 +362,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship</em></ins></span> system <span 
class="removed"><del><strong>upgrade</strong></del></span> <span 
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
+    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
     by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
@@ -439,12 +439,12 @@
   &lt;/li&gt;
 
   &lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>locations
+    &lt;p&gt;Apple rejected an app that displayed the locations
     of US drone assassinations, giving various excuses. Each
-    time the developers fixed one &ldquo;problem&rdquo;,</em></ins></span> 
Apple <span class="removed"><del><strong>did not forcibly 
install</strong></del></span>
-    <span class="inserted"><ins><em>complained about another.  
After</em></ins></span> the <span class="removed"><del><strong>upgrade 
but</strong></del></span> <span class="inserted"><ins><em>fifth rejection, 
Apple &lt;a
+    time the developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app 
based on the subject matter&lt;/a&gt;.&lt;/p&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -459,8 +459,10 @@
     to find&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+    to turn this off&rdquo; while ensuring that few will understand 
how</em></ins></span>
+    to <span class="removed"><del><strong>download a system upgrade
+         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;. 
+         Apple did not forcibly install the upgrade but the downloading alone 
caused lots of trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -487,99 +489,95 @@
 <span class="removed"><del><strong>&lt;p&gt;The wrongs in this 
section</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;p&gt;These</em></ins></span> are <span 
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>which Apple employs its power over users
-to directly intervene in ways</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
+not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way that hurts the user.
+But they are a lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> Apple
+<span class="removed"><del><strong>actions</strong></del></span> <span 
class="inserted"><ins><em>employs its power over users
+to directly intervene in ways</em></ins></span> that harm <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
-    the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>performance 
of older phones to force users to buy their newer
+    the <span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>performance</em></ins></span> of <span 
class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span> to 
<span class="inserted"><ins><em>block
-    Telegram in Russia.&lt;/p&gt;
+    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
-    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>to block
+    Telegram in Russia.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The <span class="removed"><del><strong>Apple 
Music</strong></del></span> <span 
class="inserted"><ins><em>Telegram</em></ins></span> client
+      <span class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>is free software on other platforms, but not on
     iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
     are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
-    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes</em></ins></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>file system from HFS+  to APFS&lt;/a&gt;, which 
cannot be
-    accessed from GNU/Linux, Windows or even older versions</em></ins></span> 
of <span class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>MacOS.&lt;/p&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    changes</em></ins></span> the <span 
class="removed"><del><strong>user's</strong></del></span> file system <span 
class="inserted"><ins><em>from HFS+  to APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706060"&gt;
     &lt;p&gt;Apple will stop &lt;a
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
-    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
+    bugs</em></ins></span> for <span class="removed"><del><strong>music files, 
copies them</strong></del></span> <span class="inserted"><ins><em>older model 
iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile,</em></ins></span> Apple <span 
class="inserted"><ins><em>stops people from fixing problems themselves;
-    that's the nature of proprietary</em></ins></span> software.&lt;/p&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;/li&gt;
+    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
+    that's the nature of proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
 
   &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains DRM specifically designed to &lt;a
+    iPhone 7 contains DRM specifically designed</em></ins></span> to <span 
class="inserted"><ins><em>&lt;a
     
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
-    brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
+    brick it if</em></ins></span> an <span class="removed"><del><strong>Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;unauthorized&rdquo; repair shop fixes 
it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
     &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
     to describe the DRM, but we prefer to use the term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
-    handcuffs&lt;/a&gt;.&lt;/p&gt;
+    handcuffs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201606080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;</em></ins></span>
     &lt;p&gt;Apple &lt;a
-    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</em></ins></span>
     stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201605040"&gt;</em></ins></span>
-    &lt;p&gt;The Apple Music client program &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;
+    &lt;p&gt;The Apple Music client program &lt;a
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
     the user's file system for music files, copies them to an Apple server,
     and deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Apple &lt;a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-stops users from fixing the security bugs in Quicktime for
-      Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201602050"&gt;</em></ins></span>
+  &lt;li id="M201602050"&gt;</em></ins></span>
     &lt;p&gt;iOS version 9 for iThings &lt;a
     
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
     Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from the users. However, it has not acknowledged that this
+    criticism from the <span class="removed"><del><strong>users. However, it 
has not acknowledged</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510020"&gt;
+  &lt;li id="M201510020"&gt;
     &lt;p&gt;Apple forced millions of iThings to &lt;a
     href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
     a system upgrade without asking the users&lt;/a&gt;. Apple did not
@@ -590,11 +588,14 @@
   &lt;li id="M201412040"&gt;
     &lt;p&gt;Apple &lt;a
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods the music that users had got from internet music
-    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+    deleted from iPods the music</em></ins></span> that
+    <span class="removed"><del><strong>this was 
wrong.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
had got from internet music
+    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200709270"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200709270"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</em></ins></span>
     An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
@@ -618,10 +619,27 @@
     track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span class="removed"><del><strong>iPods the 
music that users had got</strong></del></span>
-    <span class="inserted"><ins><em>Apple or</em></ins></span> from <span 
class="removed"><del><strong>internet music
-  stores</strong></del></span> <span 
class="inserted"><ins><em>governments</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can command Apple's obedience (such
-    as the US and China).&lt;/p&gt;</em></ins></span>
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span 
class="removed"><del><strong>iPods</strong></del></span>
+    <span class="inserted"><ins><em>Apple or from governments that can command 
Apple's obedience (such
+    as</em></ins></span> the <span 
class="removed"><del><strong>music</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>users had got from internet music
+  stores</strong></del></span> <span class="inserted"><ins><em>are busy at 
night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -992,7 +1010,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:53 $
+$Date: 2019/06/10 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- malware-apple.ja.po 7 Jun 2019 08:33:53 -0000       1.105
+++ malware-apple.ja.po 10 Jun 2019 09:02:20 -0000      1.106
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -925,6 +925,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-apple.nl-diff.html  7 Jun 2019 08:33:53 -0000       1.60
+++ malware-apple.nl-diff.html  10 Jun 2019 09:02:20 -0000      1.61
@@ -325,9 +325,9 @@
 &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
 walls of the iThing jail: users can now install apps built from
 source code, provided the source code is written in Swift.  Users
-cannot do this freely because they are required</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>identify
+cannot do this freely because they are required to identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="inserted"><ins><em>crack in the prison walls, it is not
+are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
 big enough to mean that the iThings are no longer jails.&lt;/p&gt;
 
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
@@ -362,8 +362,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship</em></ins></span> system <span 
class="removed"><del><strong>upgrade</strong></del></span> <span 
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
+    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
     by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
@@ -439,12 +439,12 @@
   &lt;/li&gt;
 
   &lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>locations
+    &lt;p&gt;Apple rejected an app that displayed the locations
     of US drone assassinations, giving various excuses. Each
-    time the developers fixed one &ldquo;problem&rdquo;,</em></ins></span> 
Apple <span class="removed"><del><strong>did not forcibly 
install</strong></del></span>
-    <span class="inserted"><ins><em>complained about another.  
After</em></ins></span> the <span class="removed"><del><strong>upgrade 
but</strong></del></span> <span class="inserted"><ins><em>fifth rejection, 
Apple &lt;a
+    time the developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app 
based on the subject matter&lt;/a&gt;.&lt;/p&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -459,8 +459,10 @@
     to find&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+    to turn this off&rdquo; while ensuring that few will understand 
how</em></ins></span>
+    to <span class="removed"><del><strong>download a system upgrade
+         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;. 
+         Apple did not forcibly install the upgrade but the downloading alone 
caused lots of trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -487,99 +489,95 @@
 <span class="removed"><del><strong>&lt;p&gt;The wrongs in this 
section</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;p&gt;These</em></ins></span> are <span 
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>which Apple employs its power over users
-to directly intervene in ways</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
+not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way that hurts the user.
+But they are a lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> Apple
+<span class="removed"><del><strong>actions</strong></del></span> <span 
class="inserted"><ins><em>employs its power over users
+to directly intervene in ways</em></ins></span> that harm <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
-    the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>performance 
of older phones to force users to buy their newer
+    the <span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>performance</em></ins></span> of <span 
class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span> to 
<span class="inserted"><ins><em>block
-    Telegram in Russia.&lt;/p&gt;
+    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
-    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>to block
+    Telegram in Russia.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The <span class="removed"><del><strong>Apple 
Music</strong></del></span> <span 
class="inserted"><ins><em>Telegram</em></ins></span> client
+      <span class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>is free software on other platforms, but not on
     iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
     are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
-    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes</em></ins></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>file system from HFS+  to APFS&lt;/a&gt;, which 
cannot be
-    accessed from GNU/Linux, Windows or even older versions</em></ins></span> 
of <span class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>MacOS.&lt;/p&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    changes</em></ins></span> the <span 
class="removed"><del><strong>user's</strong></del></span> file system <span 
class="inserted"><ins><em>from HFS+  to APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706060"&gt;
     &lt;p&gt;Apple will stop &lt;a
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
-    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
+    bugs</em></ins></span> for <span class="removed"><del><strong>music files, 
copies them</strong></del></span> <span class="inserted"><ins><em>older model 
iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile,</em></ins></span> Apple <span 
class="inserted"><ins><em>stops people from fixing problems themselves;
-    that's the nature of proprietary</em></ins></span> software.&lt;/p&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;/li&gt;
+    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
+    that's the nature of proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
 
   &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains DRM specifically designed to &lt;a
+    iPhone 7 contains DRM specifically designed</em></ins></span> to <span 
class="inserted"><ins><em>&lt;a
     
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
-    brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
+    brick it if</em></ins></span> an <span class="removed"><del><strong>Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;unauthorized&rdquo; repair shop fixes 
it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
     &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
     to describe the DRM, but we prefer to use the term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
-    handcuffs&lt;/a&gt;.&lt;/p&gt;
+    handcuffs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201606080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;</em></ins></span>
     &lt;p&gt;Apple &lt;a
-    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</em></ins></span>
     stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201605040"&gt;</em></ins></span>
-    &lt;p&gt;The Apple Music client program &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;
+    &lt;p&gt;The Apple Music client program &lt;a
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
     the user's file system for music files, copies them to an Apple server,
     and deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Apple &lt;a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-stops users from fixing the security bugs in Quicktime for
-      Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201602050"&gt;</em></ins></span>
+  &lt;li id="M201602050"&gt;</em></ins></span>
     &lt;p&gt;iOS version 9 for iThings &lt;a
     
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
     Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from the users. However, it has not acknowledged that this
+    criticism from the <span class="removed"><del><strong>users. However, it 
has not acknowledged</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510020"&gt;
+  &lt;li id="M201510020"&gt;
     &lt;p&gt;Apple forced millions of iThings to &lt;a
     href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
     a system upgrade without asking the users&lt;/a&gt;. Apple did not
@@ -590,11 +588,14 @@
   &lt;li id="M201412040"&gt;
     &lt;p&gt;Apple &lt;a
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods the music that users had got from internet music
-    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+    deleted from iPods the music</em></ins></span> that
+    <span class="removed"><del><strong>this was 
wrong.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
had got from internet music
+    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200709270"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200709270"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</em></ins></span>
     An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
@@ -618,10 +619,27 @@
     track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span class="removed"><del><strong>iPods the 
music that users had got</strong></del></span>
-    <span class="inserted"><ins><em>Apple or</em></ins></span> from <span 
class="removed"><del><strong>internet music
-  stores</strong></del></span> <span 
class="inserted"><ins><em>governments</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can command Apple's obedience (such
-    as the US and China).&lt;/p&gt;</em></ins></span>
+    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span 
class="removed"><del><strong>iPods</strong></del></span>
+    <span class="inserted"><ins><em>Apple or from governments that can command 
Apple's obedience (such
+    as</em></ins></span> the <span 
class="removed"><del><strong>music</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>users had got from internet music
+  stores</strong></del></span> <span class="inserted"><ins><em>are busy at 
night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -992,7 +1010,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:53 $
+$Date: 2019/06/10 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-apple.nl.po 7 Jun 2019 08:33:53 -0000       1.60
+++ malware-apple.nl.po 10 Jun 2019 09:02:20 -0000      1.61
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -935,6 +935,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- malware-apple.pot   7 Jun 2019 08:33:53 -0000       1.72
+++ malware-apple.pot   10 Jun 2019 09:02:20 -0000      1.73
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -650,6 +650,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a "
+"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\";>
 "
+"sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a "
 
"href=\"https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history\";>reports
 "
 "the user's browsing history</a>."

Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- malware-apple.ru.po 7 Jun 2019 09:33:33 -0000       1.199
+++ malware-apple.ru.po 10 Jun 2019 09:02:20 -0000      1.200
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2019-01-29 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -919,6 +920,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-mobiles.de-diff.html        8 Jun 2019 08:31:13 -0000       1.56
+++ malware-mobiles.de-diff.html        10 Jun 2019 09:02:20 -0000      1.57
@@ -403,7 +403,7 @@
     &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
       meant</strong></del></span> <span class="inserted"><ins><em>these apps 
are proprietary it makes it
-    hard</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>impossible to know which apps are at risk.&lt;/p&gt;
+    hard to impossible to know which apps are at risk.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405190"&gt;
@@ -507,6 +507,23 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905060"&gt;
     &lt;p&gt;BlizzCon 2019 imposed a &lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
@@ -860,7 +877,7 @@
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant to track</em></ins></span> users and show them targeted 
ads.&lt;/dd&gt;
+      meant</em></ins></span> to track users and show them targeted 
ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
@@ -883,125 +900,122 @@
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML <span 
class="removed"><del><strong>pages, and also uses
-      roughly 5 tracking libraries. Developers of this app have
-      confirmed that the non-premium version of the app does
-      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5</strong></del></span>
+      <span class="inserted"><ins><em>five</em></ins></span> tracking 
libraries. Developers of this app have confirmed that
+      the <span class="removed"><del><strong>non-premium version 
of</strong></del></span> <span class="inserted"><ins><em>non-premium version of 
the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
   &lt;/dl&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It</strong></del></span> <span class="inserted"><ins><em>pages, 
and</em></ins></span> also uses <span class="inserted"><ins><em>roughly
-      five tracking libraries. Developers of this app have confirmed 
that</em></ins></span>
-      the <span class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. 
A good replacement</strong></del></span> <span 
class="inserted"><ins><em>non-premium version of the app does JavaScript 
injection</em></ins></span> for <span class="removed"><del><strong>that word is 
&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span>
-      <span class="inserted"><ins><em>tracking the user and displaying 
ads.&lt;/dd&gt;
-    &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending</em></ins></span> lots of <span 
class="removed"><del><strong>surveillance, judging by</strong></del></span> 
<span class="inserted"><ins><em>data to China&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable phones &lt;a
+    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic Photo app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    &lt;p&gt;Facebook's new Magic Photo app &lt;a
+    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you</em></ins></span> to <span 
class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>share the picture you take according to who 
is</em></ins></span>
-    in the <span class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
- &lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+    and suggests you to share the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
-    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>transmit</strong></del></span> <span 
class="inserted"><ins><em>require online access to some
+    &lt;p&gt;This spyware feature seems to require online access to some
     known-faces database, which means the pictures are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+    sent across</em></ins></span> the <span class="removed"><del><strong>app 
does
+      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and 
<span class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none of Facebook</em></ins></span> users' <span 
class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them</em></ins></span> to 
<span class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>the service.&lt;/p&gt;
+    &lt;p&gt;If so, none</em></ins></span> of <span 
class="inserted"><ins><em>Facebook users' pictures are private anymore,
+    even if</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them to</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary apps,</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening to or watching&lt;/a&gt;. In 
addition,</em></ins></span>
+    it <span class="removed"><del><strong>was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of</strong></del></span> <span class="inserted"><ins><em>may be 
analyzing people's conversations to serve</em></ins></span> them <span 
class="removed"><del><strong>are</strong></del></span> <span 
class="inserted"><ins><em>with targeted
     advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not only can &lt;a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A pregnancy test controller application</em></ins></span> not 
<span class="removed"><del><strong>in fact</strong></del></span> <span 
class="inserted"><ins><em>only can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+  It also uses</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of data in</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>include &lt;a
-    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio and TV programs
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>track users by</strong></del></span> <span 
class="inserted"><ins><em>include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played 
by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio and</em></ins></span> 
TV <span class="removed"><del><strong>programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
     such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+               &lt;p&gt;Faceapp appears to do lots</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>surveillance, judging by</strong></del></span> 
<span class="inserted"><ins><em>monitoring
+    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software to make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span> <span 
class="inserted"><ins><em>make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511190"&gt;
-    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal data
+       to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
 
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
-    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not enough
-to legitimize actions like this.  At this point,</strong></del></span> <span 
class="inserted"><ins><em>500</em></ins></span> most <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
+    unrelated to the app's functionality, was</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in</em></ins></span> the <span class="removed"><del><strong>personal 
details of users</strong></del></span> <span class="inserted"><ins><em>500 most 
popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article should not</em></ins></span> have
-<span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>described these apps as
+    &lt;p&gt;The article should not have described these apps as
     &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
     to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
-    legitimate, but is</em></ins></span> that <span 
class="removed"><del><strong>spell out</strong></del></span> <span 
class="inserted"><ins><em>valid? Software developers have no right to
-    analyze</em></ins></span> what <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+    &lt;p&gt;The article takes for granted</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>usual analytics 
tools are
+    legitimate, but</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>that valid? Software developers have no 
right</em></ins></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most</strong></del></span>
+    <span class="inserted"><ins><em>analyze what</em></ins></span> users <span 
class="removed"><del><strong>have
+stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>are doing or how.  &ldquo;Analytics&rdquo; 
tools</em></ins></span>
+    that <span class="removed"><del><strong>spell out
+what they</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
 and honestly identify the information it collects on users, instead
 of hiding it in an obscurely worded EULA.&lt;/p&gt;
 
 &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and</strong></del></span> <span class="inserted"><ins><em>doing or how.  
&ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any</em></ins></span> other <span 
class="removed"><del><strong>companies from getting this personal information 
in the first
+and</strong></del></span> <span class="inserted"><ins><em>just as wrong as 
any</em></ins></span> other <span class="removed"><del><strong>companies from 
getting this personal information in the first
 place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1037,11 +1051,11 @@
     smartphones&lt;/a&gt; by sending hidden text messages which enable
     them to turn</em></ins></span> the <span class="removed"><del><strong>app 
is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
and <span class="inserted"><ins><em>off, listen to</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>GPS, take photographs, read
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
     text messages, read call, location and web browsing history, and
-    read</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware</em></ins></span> is
+    read the contact list. This malware</em></ins></span> is
     <span class="removed"><del><strong>still spyware.&lt;/p&gt;
 &lt;/li&gt;
 &lt;li&gt;&lt;p&gt;The Meitu photo-editing
@@ -1362,7 +1376,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/08 08:31:13 $
+$Date: 2019/06/10 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-mobiles.de.po       8 Jun 2019 08:31:13 -0000       1.113
+++ malware-mobiles.de.po       10 Jun 2019 09:02:20 -0000      1.114
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -835,6 +835,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- malware-mobiles.es.po       9 Jun 2019 10:41:21 -0000       1.129
+++ malware-mobiles.es.po       10 Jun 2019 09:02:20 -0000      1.130
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -716,6 +717,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- malware-mobiles.fr.po       8 Jun 2019 16:55:38 -0000       1.154
+++ malware-mobiles.fr.po       10 Jun 2019 09:02:20 -0000      1.155
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2019-06-08 18:55+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -716,6 +717,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-mobiles.it-diff.html        8 Jun 2019 08:31:13 -0000       1.61
+++ malware-mobiles.it-diff.html        10 Jun 2019 09:02:20 -0000      1.62
@@ -136,9 +136,9 @@
 &lt;p&gt;Google can also &lt;a
 
href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
 title="at</strong></del></span> <span class="inserted"><ins><em>communication 
with</em></ins></span> the <span class="removed"><del><strong>Wayback Machine 
(archived May 20, 2015)"&gt;forcibly and remotely
-install apps&lt;/a&gt; through GTalkService (which seems, since that article, 
to have
-been merged into Google Play).  This adds up</strong></del></span> <span 
class="inserted"><ins><em>network, there is no way
-    to stop the network from recording its location.  Many countries
+install apps&lt;/a&gt; through GTalkService (which seems, since that 
article,</strong></del></span> <span class="inserted"><ins><em>network, there 
is no way</em></ins></span>
+    to <span class="removed"><del><strong>have
+been merged into Google Play).  This adds up</strong></del></span> <span 
class="inserted"><ins><em>stop the network from recording its location.  Many 
countries
     (including the US and the EU) require the network</em></ins></span> to 
<span class="inserted"><ins><em>store all
     these location data for months or years.&lt;/p&gt;
   &lt;/li&gt;
@@ -242,8 +242,8 @@
     that <span class="removed"><del><strong>this
   does</strong></del></span> <span class="inserted"><ins><em>impose censorship 
on application programs.&lt;/li&gt;
   &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
-    that reject any operating system</em></ins></span> not <span 
class="removed"><del><strong>operate via</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;authorized&rdquo; by</em></ins></span> the
-    <span class="inserted"><ins><em>manufacturer.&lt;/li&gt;
+    that reject any operating system</em></ins></span> not <span 
class="removed"><del><strong>operate via</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;authorized&rdquo; by the
+    manufacturer.&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -251,7 +251,7 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;See above for the &lt;a 
href="#universal-back-door"&gt;general</em></ins></span> universal back <span 
class="removed"><del><strong>door that we know nearly</strong></del></span>
+    &lt;p&gt;See above for</em></ins></span> the <span 
class="inserted"><ins><em>&lt;a 
href="#universal-back-door"&gt;general</em></ins></span> universal back <span 
class="removed"><del><strong>door that we know nearly</strong></del></span>
       <span class="inserted"><ins><em>door&lt;/a&gt; in 
essentially</em></ins></span> all
   <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>mobile phones, which permits converting
       them into full-time listening devices.&lt;/p&gt;
@@ -532,6 +532,23 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905060"&gt;
     &lt;p&gt;BlizzCon 2019 imposed a &lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
@@ -1099,45 +1116,45 @@
     twisted ways that they present snooping as</em></ins></span> a <span 
class="removed"><del><strong>server, where the &lt;em&gt;developer&lt;/em&gt; 
gets it all.</strong></del></span> <span class="inserted"><ins><em>way to 
&ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want 
that.</em></ins></span> This <span 
class="removed"><del><strong>&ldquo;service&rdquo;</strong></del></span> is 
<span class="removed"><del><strong>for suckers!&lt;/p&gt;
 
-&lt;p&gt;The server surely has</strong></del></span> a <span 
class="removed"><del><strong>&ldquo;privacy policy,&rdquo;</strong></del></span>
-    <span class="inserted"><ins><em>typical example of the attitude of the 
proprietary software industry
+&lt;p&gt;The server surely has</strong></del></span> a <span 
class="removed"><del><strong>&ldquo;privacy policy,&rdquo; and surely it
+is worthless since nearly all</strong></del></span>
+    <span class="inserted"><ins><em>typical example</em></ins></span> of <span 
class="removed"><del><strong>them are.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>surely it</strong></del></span> <span 
class="inserted"><ins><em>they send so much data that their
-    transmission</em></ins></span> is <span 
class="removed"><del><strong>worthless since nearly all</strong></del></span> 
<span class="inserted"><ins><em>a substantial expense for users.  Said 
transmission,
-    not wanted or requested by the user, clearly must constitute 
spying</em></ins></span>
-    of <span class="removed"><del><strong>them 
are.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>some 
kind.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+  Symphony surveillance software snoop on what radio and TV programs are 
+  playing nearby&lt;/a&gt;.  Also on what</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that</em></ins></span> users <span class="removed"><del><strong>post on 
various sites such as 
+  Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they send so much data that their
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% and 
47%</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
-    study in 2015&lt;/a&gt; found</em></ins></span> that <span 
class="removed"><del><strong>include 
-  &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-  Symphony surveillance software snoop on what radio and TV programs are 
-  playing nearby&lt;/a&gt;.  Also on what users post on various sites 
such</strong></del></span> <span class="inserted"><ins><em>90% of the 
top-ranked gratis proprietary
+    study in 2015&lt;/a&gt; found that 90%</em></ins></span> of <span 
class="removed"><del><strong>mobile applications, both 
from</strong></del></span> <span class="inserted"><ins><em>the top-ranked 
gratis proprietary
     Android apps contained recognizable tracking libraries. For the paid
     proprietary apps, it was only 60%.&lt;/p&gt;
 
-    &lt;p&gt;The article confusingly describes gratis apps</em></ins></span> 
as 
-  <span class="removed"><del><strong>Facebook, Google+ and 
Twitter.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;free&rdquo;, but most of them are 
not in fact &lt;a
+    &lt;p&gt;The article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% and 47% 
of mobile applications, both from</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+  &lt;li id="M201505060"&gt;
     &lt;p&gt;Gratis</em></ins></span> Android <span 
class="removed"><del><strong>and iOS
   respectively</strong></del></span> <span class="inserted"><ins><em>apps (but 
not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
   behavioral</strong></del></span>
@@ -1392,7 +1409,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/08 08:31:13 $
+$Date: 2019/06/10 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-mobiles.it.po       8 Jun 2019 08:31:13 -0000       1.113
+++ malware-mobiles.it.po       10 Jun 2019 09:02:20 -0000      1.114
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -796,6 +796,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-mobiles.ja-diff.html        8 Jun 2019 08:31:13 -0000       1.75
+++ malware-mobiles.ja-diff.html        10 Jun 2019 09:02:20 -0000      1.76
@@ -329,7 +329,7 @@
 
     &lt;p&gt;This is in addition</em></ins></span> to <span 
class="inserted"><ins><em>the fact that the car contains</em></ins></span> a 
<span class="removed"><del><strong>server, where</strong></del></span> <span 
class="inserted"><ins><em>cellular
     modem that tells big brother all</em></ins></span> the <span 
class="removed"><del><strong>&lt;em&gt;developer&lt;/em&gt; 
gets</strong></del></span> <span class="inserted"><ins><em>time 
where</em></ins></span> it <span class="removed"><del><strong>all.
-This &ldquo;service&rdquo; is for</strong></del></span> <span 
class="inserted"><ins><em>is.  If you own
+This &ldquo;service&rdquo; is</strong></del></span> <span 
class="inserted"><ins><em>is.  If you own
     such a car, it would be wise to disconnect the modem so as to turn
     off the tracking.&lt;/p&gt;
   &lt;/li&gt;
@@ -366,7 +366,7 @@
     blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
     The critique fails entirely to express concern that the app sends the
     personal data to a server, where the &lt;em&gt;developer&lt;/em&gt; gets 
it all.
-    This &ldquo;service&rdquo; is for</em></ins></span> suckers!&lt;/p&gt;
+    This &ldquo;service&rdquo; is</em></ins></span> for suckers!&lt;/p&gt;
 
     &lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and <span 
class="removed"><del><strong>surely</strong></del></span> <span 
class="inserted"><ins><em>surely
     it is worthless since nearly all of them are.&lt;/p&gt;
@@ -499,6 +499,23 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905060"&gt;
     &lt;p&gt;BlizzCon 2019 imposed a &lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
@@ -1231,7 +1248,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/08 08:31:13 $
+$Date: 2019/06/10 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- malware-mobiles.ja.po       8 Jun 2019 08:31:13 -0000       1.101
+++ malware-mobiles.ja.po       10 Jun 2019 09:02:20 -0000      1.102
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -661,6 +661,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-mobiles.pot 8 Jun 2019 08:31:13 -0000       1.79
+++ malware-mobiles.pot 10 Jun 2019 09:02:20 -0000      1.80
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -487,6 +487,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a "
+"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\";>
 "
+"sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a "
 
"href=\"https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/\";>
 "
 "requirement to run a proprietary phone app</a> to be allowed into the event."

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- malware-mobiles.ru.po       8 Jun 2019 10:32:34 -0000       1.187
+++ malware-mobiles.ru.po       10 Jun 2019 09:02:20 -0000      1.188
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -706,6 +707,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- nl.po       8 Jun 2019 08:31:13 -0000       1.95
+++ nl.po       10 Jun 2019 09:02:20 -0000      1.96
@@ -1427,6 +1427,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- pl.po       8 Jun 2019 08:31:13 -0000       1.95
+++ pl.po       10 Jun 2019 09:02:20 -0000      1.96
@@ -1164,6 +1164,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- pot 8 Jun 2019 08:31:13 -0000       1.94
+++ pot 10 Jun 2019 09:02:20 -0000      1.95
@@ -1026,6 +1026,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary-surveillance.de-diff.html       7 Jun 2019 08:33:53 -0000       
1.77
+++ proprietary-surveillance.de-diff.html       10 Jun 2019 09:02:20 -0000      
1.78
@@ -651,7 +651,13 @@
       for other apps and also core system logs. TigerVPN 
developers</strong></del></span> have <span 
class="removed"><del><strong>confirmed this.&lt;/dd&gt;
 
     &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>GPS.)&lt;/p&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
+      and may turn them over to the UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection</strong></del></span> 
<span class="inserted"><ins><em>GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -667,414 +673,535 @@
     href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
     track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This distributed bluetooth network is said</em></ins></span> to 
<span class="removed"><del><strong>LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>be
-    &ldquo;secure,&rdquo; but</em></ins></span> it <span 
class="removed"><del><strong>stores detailed logs
-      and may turn them over to</strong></del></span> <span 
class="inserted"><ins><em>is obviously &lt;em&gt;not&lt;/em&gt; secure from
-    Apple or from governments that can command Apple's obedience (such
-    as</em></ins></span> the <span class="removed"><del><strong>UK government 
if
-      requested.&lt;/dd&gt;
+    &lt;p&gt;This distributed bluetooth network</em></ins></span> is <span 
class="inserted"><ins><em>said</em></ins></span> to <span 
class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>be
+    &ldquo;secure,&rdquo; but</em></ins></span> it <span 
class="removed"><del><strong>redirects the
+      user's traffic through valueclick.com (an advertising
+      website).&lt;/dd&gt;
 
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed</strong></del></span> <span class="inserted"><ins><em>is 
obviously &lt;em&gt;not&lt;/em&gt; secure from
+    Apple or from governments</em></ins></span> that <span 
class="inserted"><ins><em>can command Apple's obedience (such
+    as</em></ins></span> the <span class="removed"><del><strong>non-premium 
version of the app does
+      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>US</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span 
class="inserted"><ins><em>China).&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span>
 
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>HTML pages returned</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated purpose 
of</strong></del></span> <span class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>the top-ranked gratis
+  proprietary Android</strong></del></span> <span 
class="inserted"><ins><em>Apple's supposed commitment to
+    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The article <span class="removed"><del><strong>confusingly 
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions 
specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree</em></ins></span> apps 
<span class="inserted"><ins><em>contain
+    trackers. Some of these send personally identifying data 
such</em></ins></span> as <span class="removed"><del><strong>&ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
+    is collected by</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
+  for that word</strong></del></span> <span class="inserted"><ins><em>company, 
there</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that</strong></del></span> <span class="inserted"><ins><em>no telling what 
it</em></ins></span> will <span class="removed"><del><strong>fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the <span class="removed"><del><strong>JS 
injection is</strong></del></span> <span class="inserted"><ins><em>latest 
iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be 
spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702150"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use</em></ins></span> it <span 
class="removed"><del><strong>redirects</strong></del></span> <span 
class="inserted"><ins><em>without having your fingerprints taken. Users would 
have
-    no way to tell whether</em></ins></span> the
-      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
-      roughly 5 tracking libraries. Developers</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="removed"><del><strong>transmit users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
+    no way</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
-    them from there.&lt;/p&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots</em></ins></span> of <span class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    them from there.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>have
-      confirmed</strong></del></span> <span class="inserted"><ins><em>on 
iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number</em></ins></span> that the <span 
class="removed"><del><strong>non-premium version of</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>app does
-      JavaScript injection</strong></del></span>
-    <span class="inserted"><ins><em>server records these 
numbers</em></ins></span> for <span class="removed"><del><strong>tracking and 
display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>at least 
30 days.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span>
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span class="removed"><del><strong>paid proprietary 
apps, it was only 60%.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
+    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>on iThings</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number</em></ins></span> that <span 
class="removed"><del><strong>install</strong></del></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span>
+    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's 
servers all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
+    and <span class="removed"><del><strong>Conditions&rdquo; that spell out
+what</strong></del></span> <span 
class="inserted"><ins><em>videos</em></ins></span> they <span 
class="removed"><del><strong>are &ldquo;consenting&rdquo; to.  Google should 
clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of</strong></del></span> <span class="inserted"><ins><em>photos
-    and videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps</em></ins></span> them <span class="inserted"><ins><em>up 
to date on all your devices. Any edits you
-    make</em></ins></span> are <span class="removed"><del><strong>not in 
fact</strong></del></span> <span class="inserted"><ins><em>automatically 
updated everywhere. [&hellip;] &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
+&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>make.&lt;/p&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span class="removed"><del><strong>other companies 
from getting this personal information in the first
+place!&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track 
users</strong></del></span> <span 
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT202033"&gt;activated</em></ins></span>
 by
-       <span class="removed"><del><strong>&lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
 <span class="inserted"><ins><em>the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>video</em></ins></span> you <span 
class="removed"><del><strong>disable Google Maps</strong></del></span>
+    <span class="inserted"><ins><em>take,</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>keeps them up</em></ins></span> to <span 
class="removed"><del><strong>completely stop the tracking.  
This</strong></del></span> <span class="inserted"><ins><em>date on all your 
devices. Any edits you
+    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is
+    <span class="removed"><del><strong>yet another 
example</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup</em></ins></span> of <span class="removed"><del><strong>nonfree 
software pretending</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or 
played</strong></del></span>
+    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
+    when</strong></del></span>
     <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active</em></ins></span> by <span 
class="removed"><del><strong>TV programs&lt;/a&gt;.
-       &lt;/p&gt;
+    iCloud&lt;/a&gt;, but</em></ins></span> it's <span 
class="removed"><del><strong>actually doing something else.  
Such</strong></del></span> <span class="inserted"><ins><em>active by default so 
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing 
would be almost
+    unthinkable with free software.&lt;/p&gt;
 
-&lt;/li&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>default 
so it still counts as a
-    surveillance functionality.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;More than 73%</strong></del></span>
+    <span class="inserted"><ins><em>surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>Android apps can collude to transmit users' 
personal
-       data</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span>
+    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>the most popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>this 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos</em></ins></span> of <span class="removed"><del><strong>pairs 
that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details</strong></del></span> <span 
class="inserted"><ins><em>many celebrities&lt;/a&gt;. They needed to break 
Apple's
-    security to get at them, but NSA can access any</em></ins></span> of <span 
class="removed"><del><strong>users that install the app&lt;/a&gt;.&lt;/p&gt;
+    nude photos</em></ins></span> of <span class="removed"><del><strong>their 
users with third parties.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>many 
celebrities&lt;/a&gt;. They needed</em></ins></span> to <span 
class="removed"><del><strong>the app's functionality,
+  was</strong></del></span> <span class="inserted"><ins><em>break Apple's
+    security to get at them, but NSA can access any of them 
through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users 
is</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This may have improved with &lt;a
+  &lt;p&gt;The article should not</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This may</em></ins></span> have <span 
class="removed"><del><strong>described these apps as
+  &ldquo;free&rdquo;&mdash;they are</strong></del></span> <span 
class="inserted"><ins><em>improved with &lt;a
     
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</em></ins></span>
-    not <span class="removed"><del><strong>enough</strong></del></span> <span 
class="inserted"><ins><em>as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    not <span class="removed"><del><strong>free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>as much as Apple 
claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>exist</em></ins></span>
+    for <span class="removed"><del><strong>granted that the usual analytics 
tools are
+  legitimate, but is that valid?  Software developers 
have</strong></del></span> no <span class="removed"><del><strong>right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>possible purpose</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not</strong></del></span> <span 
class="inserted"><ins><em>than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
+      connect to 100</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span class="removed"><del><strong>honestly 
identify</strong></del></span>
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,</strong></del></span>
     <span class="inserted"><ins><em>get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>NSA snoop</em></ins></span> on <span 
class="inserted"><ins><em>all the data in an iThing, or it
+    Either Apple helps the NSA snoop</em></ins></span> on <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> in <span 
class="removed"><del><strong>some Android devices when they are sold.
+      Some Motorola phones modify Android to</strong></del></span> <span 
class="inserted"><ins><em>an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also &lt;a
-    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    &lt;p&gt;The iThing also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
-    turned off.&lt;/p&gt;
+    turned off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track</em></ins></span> 
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
-    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers 
add</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also</em></ins></span> a <span 
class="inserted"><ins><em>feature for web sites to track users, which 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
+    still true in iOS 7.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
 
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
-    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
-    to it.&lt;/p&gt;
+    to <span class="removed"><del><strong>any file on</strong></del></span> 
<span class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without 
giving a valid
+    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
+    to it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
+
+<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android 
Telephones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make 
it</strong></del></span> <span class="inserted"><ins><em>movements of Android 
phones, and sometimes</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
+      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>iOS 
DRM.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>location 
data to Google.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201812060"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what</em></ins></span> the <span class="removed"><del><strong>latest 
iThings system, &ldquo;turning off&rdquo; WiFi and 
Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
     &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead, &lt;a
-    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
+    in airplane mode. It didn't send</em></ins></span> the
+      <span class="removed"><del><strong>obvious way</strong></del></span> 
<span class="inserted"><ins><em>location data while in
+    airplane mode.  Instead,</em></ins></span> &lt;a
+ <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
+    it saved up the data, and sent</em></ins></span> them <span 
class="removed"><del><strong>off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
-    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
+    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the phone <span class="removed"><del><strong>is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending</em></ins></span> lots of <span 
class="removed"><del><strong>personal</strong></del></span> data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a</em></ins></span> component of Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example of nonfree software pretending to obey the user,
+  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
+    &lt;p&gt;Google Play (a component of Android)</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</em></ins></span> the <span class="removed"><del><strong>server 
records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>users' movements</em></ins></span> without <span 
class="removed"><del><strong>giving a valid email address</strong></del></span> 
<span class="inserted"><ins><em>their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>receiving the code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>location 
tracking, you must
+    disable Google Play itself</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>completely stop</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
+      &lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>tracking.  This is
+    yet another example</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>nonfree software pretending</em></ins></span> to 
<span class="removed"><del><strong>Apple's servers all</strong></del></span> 
<span class="inserted"><ins><em>obey</em></ins></span> the <span 
class="removed"><del><strong>photos</strong></del></span> <span 
class="inserted"><ins><em>user,
     when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
+    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;,</em></ins></span> and
+      <span class="removed"><del><strong>videos</strong></del></span> they 
<span class="removed"><del><strong>make.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; 
of</strong></del></span> <span class="inserted"><ins><em>they send so much data 
that</em></ins></span> their <span class="removed"><del><strong>users with 
third parties.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>transmission is a substantial expense for 
users.  Said transmission,
-    not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up to date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>send so much data 
that their
+    transmission</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>a substantial expense for users.  Said 
transmission,
+    not wanted or requested</em></ins></span> by the
+      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
+    of <span class="removed"><del><strong>iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+    &lt;p&gt;There is a way</strong></del></span> <span 
class="inserted"><ins><em>some kind.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+  &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="inserted"><ins><em>any file on</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found</strong></del></span> <span class="inserted"><ins><em>system.&lt;/p&gt;
+    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span> <span 
class="inserted"><ins><em>any file on the system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>the 500 most popular gratis</strong></del></span> 
Android <span class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us</em></ins></span> by <span 
class="removed"><del><strong>default so it still counts 
as</strong></del></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
 
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>phones (and Windows? 
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to 
say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> <span class="inserted"><ins><em>paywall) reports 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security to get at them, but NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-  &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>Wall 
Street
-    Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>takes for granted</strong></del></span> <span 
class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="inserted"><ins><em>&lt;a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>&lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>FBI can remotely 
activate</em></ins></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span class="inserted"><ins><em>GPS</em></ins></span> 
and <span class="removed"><del><strong>get other info too.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone 
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>phones</em></ins></span>
-    and <span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt;.  (I suspect this means Windows 
laptops.)  Here is &lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which</strong></del></span> <span class="inserted"><ins><em>microphone in 
Android phones
+    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  
Here</em></ins></span> is &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but 
it</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when 
they are
-    sold.  Some Motorola <span class="removed"><del><strong>phones 
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when 
this company was owned
-    by Google, use a modified version of</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      <span class="removed"><del><strong>send</strong></del></span>
-    <span class="inserted"><ins><em>sends</em></ins></span> personal data to 
Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>still true</strong></del></span> <span 
class="inserted"><ins><em>present</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Android devices when they are
+    sold.  Some Motorola phones, made when this company was 
owned</em></ins></span>
+    by <span class="removed"><del><strong>default, 
though</strong></del></span> <span class="inserted"><ins><em>Google, use a 
modified version of Android</em></ins></span> that <span 
class="removed"><del><strong>can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal</em></ins></span> data <span 
class="removed"><del><strong>from iPhones</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+  &lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    listens</em></ins></span> for <span class="inserted"><ins><em>voice 
all</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
-    legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>personal details of 
users that install</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some</em></ins></span> manufacturers add a &lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier <span 
class="removed"><del><strong>IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo;</em></ins></span> of 
<span class="removed"><del><strong>iOS seem to exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> is <span 
class="inserted"><ins><em>not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading</em></ins></span> the
+      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
 
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is 
pervasive</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms</em></ins></span> and
+      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
-&lt;/div&gt;
+  &lt;li&gt;&lt;p&gt;Android tracks location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Conditions&rdquo; that spell out what
+    they</em></ins></span> are <span class="removed"><del><strong>turned off, 
even
+      when</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should clearly 
and
+    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, 
instead</em></ins></span> of <span class="removed"><del><strong>data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>the EU Copyright Directive make 
it</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, 
because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes</em></ins></span> this
-      <span class="removed"><del><strong>would require circumventing the iOS 
DRM.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
+      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span>
+    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
+
+    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>turn the phones
+      on</strong></del></span> <span class="inserted"><ins><em>truly protect 
people's privacy, we must prevent Google</em></ins></span>
+    and <span class="removed"><del><strong>off, listen to the microphone, 
retrieve geo-location data</strong></del></span> <span 
class="inserted"><ins><em>other companies</em></ins></span> from <span 
class="inserted"><ins><em>getting this personal information 
in</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read the contact list. This malware is designed to
+      disguise itself from investigation.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
-      obvious way &lt;a
- 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>code 
snoops on readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
+    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send</em></ins></span> lots of <span 
class="removed"><del><strong>personal</strong></del></span> data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed to check DRM!&lt;/p&gt;</em></ins></span>
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201603080"&gt;
+    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, &lt;a
+    
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;</em></ins></span>
+    send <span class="removed"><del><strong>so much</strong></del></span> 
<span class="inserted"><ins><em>lots of</em></ins></span> data <span 
class="removed"><del><strong>that their transmission is a
+      substantial expense for users.  Said transmission, not wanted or
+      requested by</strong></del></span> <span class="inserted"><ins><em>to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
+  &lt;li id="M201212030"&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that</strong></del></span>
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the user <span 
class="removed"><del><strong>types into it&lt;/a&gt;; the server records these 
numbers for</strong></del></span> <span 
class="inserted"><ins><em>reads</em></ins></span> at <span 
class="removed"><del><strong>least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    report even which page</em></ins></span> the <span 
class="inserted"><ins><em>user reads at what</em></ins></span> 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
+  &lt;h3 id="SpywareInApplications"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? 
laptops):</strong></del></span> <span 
class="inserted"><ins><em>Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1086,577 +1213,458 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="removed"><del><strong>install</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
-
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it</em></ins></span> even <span class="removed"><del><strong>gratis 
apps)&lt;/a&gt;
-      without giving</strong></del></span> <span 
class="inserted"><ins><em>more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not</em></ins></span> a <span class="removed"><del><strong>valid email 
address and receiving</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running 
it&lt;/a&gt;.</em></ins></span> The <span class="removed"><del><strong>Wall
+      Street Journal (in an article blocked from us by</strong></del></span> 
<span class="inserted"><ins><em>result is
+    often</em></ins></span> a <span class="removed"><del><strong>paywall)
+      reports</strong></del></span> <span class="inserted"><ins><em>legal 
threat demanding a lot of money.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying for</em></ins></span> the <span class="removed"><del><strong>most 
popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+    &lt;p&gt;The fact</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS and microphone in Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect</strong></del></span> this <span 
class="removed"><del><strong>means Windows laptops.)  
Here</strong></del></span> is
+      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot</em></ins></span> make <span 
class="removed"><del><strong>are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says</strong></del></span> <span class="inserted"><ins><em>used 
for repression of forbidden sharing
+    makes</em></ins></span> it <span class="removed"><del><strong>will 
eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>it 
less nasty.&lt;/p&gt;
+    &lt;p&gt;This illustrates that making unauthorized copies 
of</em></ins></span> nonfree <span class="removed"><del><strong>Snapchat app's 
principal purpose</strong></del></span> <span 
class="inserted"><ins><em>software</em></ins></span>
+    is <span class="removed"><del><strong>to restrict</strong></del></span> 
<span class="inserted"><ins><em>not a cure for</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>data on</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying for</em></ins></span> the <span class="removed"><del><strong>user's 
computer,</strong></del></span> <span class="inserted"><ins><em>nasty 
thing,</em></ins></span> but <span class="inserted"><ins><em>cannot 
make</em></ins></span> it <span class="removed"><del><strong>does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="inserted"><ins><em>secretly</em></ins></span> a <span 
class="removed"><del><strong>way to</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt;</em></ins></span> by <span 
class="removed"><del><strong>default so it still counts</strong></del></span> 
<span class="inserted"><ins><em>natalist Christians.  It spreads distrust
-    for contraception.&lt;/p&gt;
-
-    &lt;p&gt;It snoops on users, too,</em></ins></span> as <span 
class="inserted"><ins><em>you must expect from nonfree
-    programs.&lt;/p&gt;
-  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201905300"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>moviepass</strong></del></span> <span 
class="inserted"><ins><em>Femm &ldquo;fertility&rdquo;</em></ins></span> app 
<span class="removed"><del><strong>and dis-service spy on users even more than 
users
+      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going to</strong></del></span> 
<span class="inserted"><ins><em>is secretly</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
+    &lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span class="removed"><del><strong>break 
Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>run a 
proprietary phone app&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span 
class="inserted"><ins><em>be allowed into
-    the event.&lt;/p&gt;
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This app is a spyware that</em></ins></span> can <span 
class="removed"><del><strong>access any</strong></del></span> <span 
class="inserted"><ins><em>snoop on a lot</em></ins></span> of <span 
class="removed"><del><strong>them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
+    for contraception.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the</strong></del></span>
-    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>iThing is,
-      and get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it</strong></del></span> <span class="inserted"><ins><em>menstrual and 
pregnancy monitoring apps</em></ins></span> is <span 
class="removed"><del><strong>still true in iOS 7.)&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run a proprietary</em></ins></span> phone <span 
class="removed"><del><strong>numbers and email addresses&lt;/a&gt; in user's 
address
+      book</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note that this article 
misuses</strong></del></span> <span class="inserted"><ins><em>be allowed 
into</em></ins></span>
+    the <span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> <span 
class="inserted"><ins><em>often</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. 
Even</em></ins></span> though <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>the
-    data is &ldquo;anonymized and aggregated,&rdquo; it</em></ins></span> can 
<span class="inserted"><ins><em>easily</em></ins></span> be
-      <span class="removed"><del><strong>turned off.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This</em></ins></span> app <span 
class="removed"><del><strong>listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to</strong></del></span>
 <span class="inserted"><ins><em>is a spyware that can</em></ins></span> snoop 
on <span class="removed"><del><strong>what people are 
listening</strong></del></span> <span class="inserted"><ins><em>a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
-    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available</em></ins></span> to <span class="removed"><del><strong>or 
watching&lt;/a&gt;. In addition,</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though the
+    data is &ldquo;anonymized and aggregated,&rdquo;</em></ins></span> it 
<span class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>can easily</em></ins></span> be <span 
class="removed"><del><strong>analyzing people's 
conversations</strong></del></span>
+    <span class="inserted"><ins><em>traced back</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to 
exist</strong></del></span> <span class="inserted"><ins><em>app.&lt;/p&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>the woman who uses the app.&lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>women's rights to 
equal employment
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
     and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less</em></ins></span> the
-      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+    these apps, even if someone offers you a reward</em></ins></span> to do 
<span class="removed"><del><strong>lots</strong></del></span> <span 
class="inserted"><ins><em>so. A
+    free-software app that does more or less the same thing without
+    spying on you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="removed"><del><strong>surveillance, judging 
by</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have</em></ins></span> access <span 
class="removed"><del><strong>it demands</strong></del></span> to <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>sensitive</em></ins></span> data <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that</strong></del></span> 
<span class="inserted"><ins><em>data, or pass</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
+        pre-install</strong></del></span> on <span 
class="removed"><del><strong>some of its phones. The app will give Verizon the 
same
+   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+   they use its search engine.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>same thing without
-    spying on you</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
-    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>new one is being 
developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>have access to</em></ins></span>
+    the <span class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to the data. This 
results in massive
+    surveillance</em></ins></span> on <span class="removed"><del><strong>only 
one phone&lt;/a&gt;, and</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> the user <span 
class="removed"><del><strong>must explicitly opt-in before the app takes 
effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>has absolutely no control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android</em></ins></span> phones <span 
class="removed"><del><strong>&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold</strong></del></span> <span 
class="inserted"><ins><em>come</em></ins></span> with <span 
class="removed"><del><strong>spyware sending lots</strong></del></span> <span 
class="inserted"><ins><em>a huge number</em></ins></span> of <span 
class="removed"><del><strong>data to China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal</em></ins></span> data to <span 
class="removed"><del><strong>a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>data, or pass it</em></ins></span> on <span 
class="removed"><del><strong>and off, listen</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps that have 
access</em></ins></span> to
-    the <span class="removed"><del><strong>microphone, retrieve geo-location 
data from the
-      GPS, take photographs, read text messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to</em></ins></span> the 
<span class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>data.</em></ins></span> This <span 
class="removed"><del><strong>malware is designed to
-      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>results in massive
-    surveillance on which the user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which</em></ins></span> can <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in the phone, and in server 
accounts,</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> it <span 
class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with
-      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found</em></ins></span> 
that <span class="removed"><del><strong>users can't delete&lt;/a&gt;,
-      and they</strong></del></span> <span class="inserted"><ins><em>19 of 
them &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;</em></ins></span>
-    send <span class="removed"><del><strong>so much</strong></del></span> 
<span class="inserted"><ins><em>sensitive personal</em></ins></span> data <span 
class="inserted"><ins><em>to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
+        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;</strong></del></span>
+    for <span class="removed"><del><strong>surveillance is inadequate as a 
protection</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising or discriminating</em></ins></span> against <span 
class="removed"><del><strong>massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service</em></ins></span> that <span 
class="removed"><del><strong>their transmission</strong></del></span> <span 
class="inserted"><ins><em>are difficult to understand. In any case,
-    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="inserted"><ins><em>not sufficient to legitimize snooping.&lt;/p&gt;
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered</em></ins></span> a
-      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span class="inserted"><ins><em>convenient 
proprietary
-    library</em></ins></span> for <span class="removed"><del><strong>users.  
Said transmission, not wanted or
-      requested by the user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>building mobile apps, which also</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that</em></ins></span> all 
the <span class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports</strong></del></span> <span class="inserted"><ins><em>personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such</strong></del></span> <span class="inserted"><ins><em>released 
them, apparently not realizing that all the personal
+    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>Facebook, Google+ and 
Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
 
-    &lt;p&gt;It shows</em></ins></span> that
-      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI</strong></del></span> <span class="inserted"><ins><em>no 
one</em></ins></span> can <span class="removed"><del><strong>remotely 
activate</strong></del></span> <span class="inserted"><ins><em>trust a nonfree 
program, not even</em></ins></span> the <span class="removed"><del><strong>GPS 
and microphone in</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how</em></ins></span> Android
-      <span class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>apps use</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span>
     <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
-      remote command</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="removed"><del><strong>users cannot stop them:</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable 
phones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is in <span 
class="removed"><del><strong>the frame.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>hardware 
identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+      &lt;p&gt;This spyware feature</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
+    Google's policies. But it</em></ins></span> seems <span 
class="inserted"><ins><em>that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across</strong></del></span> <span class="inserted"><ins><em>take 
action. This proves
+    that</em></ins></span> the <span class="removed"><del><strong>wire to 
Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="inserted"><ins><em>in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
-    that</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>data on the user's computer, but it 
does</strong></del></span> <span class="inserted"><ins><em>a development 
platform are ineffective at
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures</strong></del></span> 
<span class="inserted"><ins><em>a development platform</em></ins></span> are 
<span class="removed"><del><strong>private
+      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a</em></ins></span> surveillance
-      <span class="removed"><del><strong>too:</strong></del></span> <span 
class="inserted"><ins><em>feature for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based</strong></del></span>
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The moviepass app and dis-service spy</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902041.1"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
     &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be</em></ins></span> on <span class="removed"><del><strong>users 
even</strong></del></span> <span class="inserted"><ins><em>Google Play had one 
or</em></ins></span> more <span class="removed"><del><strong>than users
-      expected. It</strong></del></span> <span 
class="inserted"><ins><em>malicious functionalities, such as</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before</strong></del></span>
+    be</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>Google 
Play had one or more malicious functionalities, such as</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>after going to a movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
-  &lt;/li&gt;
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting</strong></del></span> <span class="inserted"><ins><em>often 
malicious ads on users, and redirecting
+    them</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>phishing sites</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>&lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example</strong></del></span> 
<span class="inserted"><ins><em>user interface</em></ins></span> of
+      <span class="removed"><del><strong>the attitude</strong></del></span> 
<span class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
-    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Sarahah app 
-      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span> <span 
class="inserted"><ins><em>often malicious ads on users,</em></ins></span> and 
<span class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
-      book</strong></del></span> <span class="inserted"><ins><em>redirecting
-    them</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note</strong></del></span> <span class="inserted"><ins><em>phishing 
sites</em></ins></span> that <span class="removed"><del><strong>this article 
misuses</strong></del></span> <span class="inserted"><ins><em>stole their 
credentials. Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
+  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> <span 
class="inserted"><ins><em>them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Users should of course uninstall these 
dangerous</em></ins></span> apps <span class="removed"><del><strong>for mobile 
devices report which other</strong></del></span> <span 
class="inserted"><ins><em>if they
+    haven't yet, but they should also stay away from nonfree</em></ins></span> 
apps <span class="removed"><del><strong>the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this</strong></del></span> in
+    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry</em></ins></span> a <span class="removed"><del><strong>way that at 
least</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
+    there</em></ins></span> is <span class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing</em></ins></span> what <span 
class="removed"><del><strong>the others</strong></del></span> <span 
class="inserted"><ins><em>they really</em></ins></span> do.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC 
says</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>150 most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on what people are listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>or 
watching&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; due to DNS 
leaks.</em></ins></span> In
-    addition, <span class="removed"><del><strong>it may</strong></del></span> 
<span class="inserted"><ins><em>85% feature intrusive permissions or functions 
in their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also</em></ins></span> be <span 
class="removed"><del><strong>analyzing people's conversations to serve them 
with targeted
-    advertisements.&lt;/p&gt;
+    &lt;p&gt;An investigation of the 150</em></ins></span> most <span 
class="removed"><del><strong>mobile</strong></del></span> <span 
class="inserted"><ins><em>popular
+    gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for 
children don't respect privacy:</strong></del></span> <span 
class="inserted"><ins><em>in Google Play found that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
        &lt;/li&gt;
 
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>used</em></ins></span> to <span 
class="removed"><del><strong>do lots of surveillance, judging 
by</strong></del></span> <span class="inserted"><ins><em>spy on users. Other 
technical flaws were
+  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often</em></ins></span> used <span 
class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>for invasive advertising&mdash;that could
+    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data 
in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half
 of</em></ins></span>
-    the <span class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span> <span class="inserted"><ins><em>top 
10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
+    the <span class="removed"><del><strong>user&lt;/a&gt;. 
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN 
apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in 
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that 
these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel</em></ins></span> app <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding</em></ins></span> that it <span 
class="removed"><del><strong>will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>notify the users</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app</strong></del></span> <span 
class="inserted"><ins><em>what it</em></ins></span> will <span 
class="removed"><del><strong>give Verizon</strong></del></span> <span 
class="inserted"><ins><em>do
-    with</em></ins></span> the <span class="removed"><del><strong>same
-   information</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is</em></ins></span> about <span 
class="inserted"><ins><em>a side issue. What</em></ins></span> the <span 
class="removed"><del><strong>users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>company does
-    with</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>data is a secondary issue. The principal wrong 
here</em></ins></span> is <span class="inserted"><ins><em>that
+    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>company's 
server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>OS in</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do
+    with</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about a side issue. 
What</em></ins></span> the <span class="removed"><del><strong>question of 
whether</strong></del></span> <span class="inserted"><ins><em>company does
+    with</em></ins></span> the <span class="removed"><del><strong>app 
developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
-  &lt;/li&gt;
-
-  &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report</em></ins></span> on <span class="removed"><del><strong>only one 
phone&lt;/a&gt;, and</strong></del></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>user's actions to 
Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
-    Facebook can correlate</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user</strong></del></span> data <span class="removed"><del><strong>to a 
Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts</strong></del></span> <span class="inserted"><ins><em>it 
obtains from the same machine via
-    various apps. Some</em></ins></span> of <span 
class="removed"><del><strong>data in</strong></del></span> <span 
class="inserted"><ins><em>them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>phone, and</strong></del></span> 
<span class="inserted"><ins><em>user's activities</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after</strong></del></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>app; 
others only say that</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>inadequate as</strong></del></span>
-    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>user's actions</em></ins></span> to
+      <span class="removed"><del><strong>approve sending 
personal</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user 
has</em></ins></span> a <span class="removed"><del><strong>protection against 
massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the</em></ins></span> data <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>it obtains from</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask</strong></del></span> <span class="inserted"><ins><em>same machine 
via
+    various apps. Some of them send Facebook detailed 
information</em></ins></span> about <span class="removed"><del><strong>sending 
it to other companies.  This shows</strong></del></span>
+    the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user's activities in the app; others only say that 
the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless</em></ins></span> of <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>user has</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
     account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;ul&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users</em></ins></span> that <span 
class="removed"><del><strong>include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop</strong></del></span> <span 
class="inserted"><ins><em>have deleted them&lt;/a&gt;.&lt;/p&gt;
+    track</em></ins></span> the <span 
class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>what radio and TV programs</strong></del></span> 
<span class="inserted"><ins><em>Android &lt;a
+    &lt;p&gt;Some Google apps on Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also on 
what</strong></del></span> <span class="inserted"><ins><em>other ways to turn 
off the other kinds of location
-    tracking, but most</em></ins></span> users <span 
class="removed"><del><strong>post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
+  &lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming</em></ins></span> app &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you to share</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>picture you take according to who
-      is in</strong></del></span> <span class="inserted"><ins><em>user's 
movements and listens through</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access</strong></del></span> <span 
class="inserted"><ins><em>makes them act as spies for licensing 
enforcement.&lt;/p&gt;
-
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But I can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>be
-      sent across</strong></del></span> <span class="inserted"><ins><em>care 
much less about sports, you will benefit in
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
-    and <span class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users' 
pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>apps were
-    found</em></ins></span> to <span class="removed"><del><strong>the 
service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>malware 
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span 
class="removed"><del><strong>submit</strong></del></span>
-    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>get rid of</em></ins></span> the <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way</strong></del></span> 
<span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is a typical example of
-      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
-    and</em></ins></span> the proprietary <span 
class="removed"><del><strong>software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> apps <span 
class="removed"><del><strong>for mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>by 
getting</em></ins></span> apps <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>user has
-    installed.</strong></del></span> <span class="inserted"><ins><em>free 
software
-    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="removed"><del><strong>at 
least is visible and
-    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns
-    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS in the
-      phone.&lt;/p&gt;
 
-      &lt;p&gt;Don't</strong></del></span>
-    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>designed so that 
users communicate such info to each
-    other but not to</em></ins></span> the <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass</em></ins></span> app <span 
class="removed"><del><strong>developers get</strong></del></span> <span 
class="inserted"><ins><em>and dis-service
-    spy on users even more than</em></ins></span> users <span 
class="inserted"><ins><em>expected. It &lt;a
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+  &lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store</em></ins></span> by 
<span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>noticing WiFi
+    is pervasive and sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201708270"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Sarahah</em></ins></span> app <span 
class="removed"><del><strong>because it asked</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>words
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>zero price.&lt;/p&gt;
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
     &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails</em></ins></span> to 
<span class="removed"><del><strong>the app developer but</strong></del></span> 
<span class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google</em></ins></span> did not
-      <span class="removed"><del><strong>ask about 
sending</strong></del></span> <span class="inserted"><ins><em>intend to make 
these apps spy; on the contrary,</em></ins></span> it
-    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="removed"><del><strong>other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>prevent that, and 
deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+    for the snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps, and
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>better job of preventing apps from
-    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
-    to <span class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span> 
to <span class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span> <span class="inserted"><ins><em>see what they 
do.&lt;/p&gt;
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
     the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job</em></ins></span> of <span 
class="inserted"><ins><em>this, it could more or less
-    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
@@ -3471,7 +3479,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:53 $
+$Date: 2019/06/10 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- proprietary-surveillance.de.po      7 Jun 2019 08:33:53 -0000       1.292
+++ proprietary-surveillance.de.po      10 Jun 2019 09:02:21 -0000      1.293
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1249,6 +1249,25 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | The DMCA and the EU Copyright Directive make it <a
 # | href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\";>
 # | illegal to study how iOS [-cr...apps-] {+cr&hellip;apps+} spy on

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.439
retrieving revision 1.440
diff -u -b -r1.439 -r1.440
--- proprietary-surveillance.fr.po      7 Jun 2019 10:26:48 -0000       1.439
+++ proprietary-surveillance.fr.po      10 Jun 2019 09:02:21 -0000      1.440
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2019-06-07 12:25+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -921,6 +922,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing.";
 "net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
 "cr&hellip;apps spy on users</a>, because this would require circumventing "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary-surveillance.it-diff.html       7 Jun 2019 08:33:54 -0000       
1.144
+++ proprietary-surveillance.it-diff.html       10 Jun 2019 09:02:21 -0000      
1.145
@@ -634,20 +634,9 @@
     disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
     yet another example of nonfree software pretending</strong></del></span>
     <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones</em></ins></span>
-    to <span class="removed"><del><strong>obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
-
+    to <span class="removed"><del><strong>obey the user,</strong></del></span> 
<span class="inserted"><ins><em>have GPS.)&lt;/p&gt;
   &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;More than 73% of the most popular Android apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated to the app's functionality,
-  was</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -657,24 +646,49 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple can &lt;a
+    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
+    track iMonsters even</em></ins></span> when <span 
class="removed"><del><strong>it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>they are 
suspended&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they</em></ins></span> are <span 
class="removed"><del><strong>not free software.  The clear way to say
-  &ldquo;zero price&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>suspended&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This distributed bluetooth network is said to</em></ins></span> 
be <span class="removed"><del><strong>almost
+    unthinkable with free software.&lt;/p&gt;
 
-    &lt;p&gt;This distributed bluetooth network</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;p&gt;The article takes for granted that the usual analytics tools are
-  legitimate,</strong></del></span> <span class="inserted"><ins><em>said to be
-    &ldquo;secure,&rdquo;</em></ins></span> but <span 
class="inserted"><ins><em>it</em></ins></span> is <span 
class="removed"><del><strong>that valid?  Software developers have no right to
-  analyze what users are doing</strong></del></span> <span 
class="inserted"><ins><em>obviously &lt;em&gt;not&lt;/em&gt; secure from
-    Apple</em></ins></span> or <span class="removed"><del><strong>how.  
&ldquo;Analytics&rdquo; tools</strong></del></span> <span 
class="inserted"><ins><em>from governments</em></ins></span> that <span 
class="removed"><del><strong>snoop are
-  just as wrong</strong></del></span> <span class="inserted"><ins><em>can 
command Apple's obedience (such</em></ins></span>
-    as <span class="removed"><del><strong>any other 
snooping.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
US and China).&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;More than 73% of</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;secure,&rdquo; but it is obviously 
&lt;em&gt;not&lt;/em&gt; secure from
+    Apple or from governments that can command Apple's obedience (such
+    as</em></ins></span> the <span class="removed"><del><strong>most popular 
Android apps
+  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral</strong></del></span> <span 
class="inserted"><ins><em>US</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China).&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>the app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these</strong></del></span>
+    <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps 
<span class="removed"><del><strong>as
+  &ldquo;free&rdquo;&mdash;they</strong></del></span> <span 
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span 
class="removed"><del><strong>not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>say
+  &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The article <span class="removed"><del><strong>takes for granted 
that</strong></del></span> <span class="inserted"><ins><em>mentions specific 
examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM),</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+    and DoorDash. But it</em></ins></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers 
have</strong></del></span> <span class="inserted"><ins><em>most nonfree apps 
contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is</em></ins></span> no <span 
class="removed"><del><strong>right to
+  analyze</strong></del></span> <span 
class="inserted"><ins><em>telling</em></ins></span> what <span 
class="removed"><del><strong>users are doing or how.  &ldquo;Analytics&rdquo; 
tools that snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it will be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not</strong></del></span>
 
@@ -687,27 +701,27 @@
     this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola phones modify Android to</strong></del></span>
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a
-      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want</em></ins></span> to <span class="removed"><del><strong>any 
file on the system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
@@ -727,10 +741,10 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
-    &lt;p&gt;Apple proposes</em></ins></span> &lt;a
+    &lt;p&gt;Apple</em></ins></span> proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch <span 
class="removed"><del><strong>screen&lt;/a&gt;
       &mdash; which</strong></del></span> <span 
class="inserted"><ins><em>screen&lt;/a&gt;&mdash;which</em></ins></span> would 
mean no way
@@ -896,41 +910,51 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
+      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen to</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
-    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data <span 
class="inserted"><ins><em>to Google.&lt;/p&gt;
-  &lt;/li&gt;
+    saves</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location</strong></del></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
-    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
-    what</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>phone has to be responsible for 
sending</em></ins></span>
+    the <span class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track</em></ins></span> location 
<span class="inserted"><ins><em>even while
-    in airplane mode. It didn't send the location data while in
+    &lt;p&gt;An Android phone was observed to track location even while
+    in airplane mode. It didn't</em></ins></span> send <span 
class="removed"><del><strong>so much</strong></del></span> <span 
class="inserted"><ins><em>the location</em></ins></span> data <span 
class="removed"><del><strong>that their transmission is a
+      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
+    &lt;p&gt;Android tracks location</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
+      requested by</strong></del></span> <span 
class="inserted"><ins><em>Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the <span class="removed"><del><strong>user, clearly must constitute 
spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> phone <span 
class="inserted"><ins><em>has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
     sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -939,41 +963,32 @@
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
     that users can't delete&lt;/a&gt;, and they send so much data that their
-    transmission is a substantial expense for users.  Said transmission,
-    not wanted or requested by the user, clearly must constitute spying
-    of some
-      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;</em></ins></span>
+    transmission is a substantial expense</em></ins></span> for <span 
class="removed"><del><strong>voice all</strong></del></span> <span 
class="inserted"><ins><em>users.  Said transmission,
+    not wanted or requested by</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user, clearly must constitute spying
+    of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
-      Street Journal (in</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+  &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in</em></ins></span> an article blocked from us by a paywall) 
reports that &lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in Android phones (and Windows? 
laptops): The Wall Street
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
     and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
@@ -981,100 +996,126 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:</strong></del></span>
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices when they are
+    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
+      the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable 
phones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="inserted"><ins><em>Android 
that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal</em></ins></span> data <span 
class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+  &lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>user's list</strong></del></span> 
<span class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="inserted"><ins><em>not 
enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo;</em></ins></span> of 
<span class="removed"><del><strong>surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>users is not enough</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span>
     <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>use of 
data on</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
+    reading</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms and Conditions&rdquo;</em></ins></span> 
that <span class="inserted"><ins><em>spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>collects on users, instead of
-    hiding</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
-
-    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other</strong></del></span> 
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
+    honestly identify the information</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
+        pre-install</strong></del></span> <span 
class="inserted"><ins><em>collects</em></ins></span> on <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>users, instead</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give Verizon the same
+   information about the users' searches that</strong></del></span>
+    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
+
+    &lt;p&gt;However, to truly protect people's privacy, we must 
prevent</em></ins></span> Google <span class="removed"><del><strong>normally 
gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span>
+    and <span class="inserted"><ins><em>other companies from getting this 
personal information in</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
+    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data in the 
device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span>
+    &lt;p&gt;E-books</em></ins></span> can <span 
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
+  &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of <span class="removed"><del><strong>its 
phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+    the e-reader used by most US libraries, &lt;a
+    
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots</em></ins></span> of data <span class="inserted"><ins><em>to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the user <span 
class="removed"><del><strong>must explicitly opt-in before the app takes 
effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    report even which page</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -1091,26 +1132,15 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
-    often</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts</strong></del></span> <span class="inserted"><ins><em>legal 
threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>data in the phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>money.&lt;/p&gt;
-
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes</em></ins></span> it <span class="removed"><del><strong>can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the 
ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The fact that this is used</em></ins></span> for <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This <span 
class="removed"><del><strong>example</strong></del></span> illustrates <span 
class="removed"><del><strong>how &ldquo;getting the user's consent&rdquo;
-        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>that making unauthorized copies of nonfree 
software</em></ins></span>
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software</em></ins></span>
     is <span class="removed"><del><strong>inadequate as</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
         surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cure for the injustice of nonfree software. It may 
avoid
     paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
@@ -1127,48 +1157,47 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span>
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>various sites 
-      such</strong></del></span> <span class="inserted"><ins><em>users, 
too,</em></ins></span> as <span class="removed"><del><strong>Facebook, Google+ 
and Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you must expect from nonfree
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span>
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span class="removed"><del><strong>share 
the picture you take according</strong></del></span> <span 
class="inserted"><ins><em>run a proprietary phone 
app&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>who
-      is in</strong></del></span> <span class="inserted"><ins><em>be allowed 
into</em></ins></span>
-    the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="inserted"><ins><em>app is a</em></ins></span> 
spyware <span class="removed"><del><strong>feature seems to require online 
access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
+
+    &lt;p&gt;This app is a spyware that can</em></ins></span> snoop on <span 
class="removed"><del><strong>what radio</strong></del></span> <span 
class="inserted"><ins><em>a lot of
+    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>contact list,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app</strong></del></span> 
<span class="inserted"><ins><em>has</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span class="inserted"><ins><em>employers 
and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can 
easily</em></ins></span> be
-      <span class="removed"><del><strong>sent across</strong></del></span>
-    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
+    available</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>picture you 
take according to who</strong></del></span>
+    <span class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>&ldquo;anonymized 
and aggregated,&rdquo; it can easily be
+    traced back</em></ins></span> to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely to be
+      sent across</strong></del></span> <span class="inserted"><ins><em>woman 
who uses</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
 
     &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
     and <span class="removed"><del><strong>face-recognition
@@ -1199,8 +1228,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>typical example</strong></del></span> <span 
class="inserted"><ins><em>huge number</em></ins></span> of
-      <span class="removed"><del><strong>the attitude of the proprietary 
software industry towards
+    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude</strong></del></span> <span class="inserted"><ins><em>huge 
number</em></ins></span> of <span class="removed"><del><strong>the proprietary 
software industry towards
       those they</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
@@ -1238,41 +1267,40 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>building mobile apps, which also</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
+      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies 
built</em></ins></span> apps <span class="removed"><del><strong>snoop 
on</strong></del></span> <span class="inserted"><ins><em>that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>personal
-    data they collected would go</em></ins></span> to <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+    sent personal data</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>companies built apps that
+    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>personal
+    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That 
is</strong></del></span> <span class="inserted"><ins><em>Facebook as 
well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>snooping done by 
the phone company,</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
+    &lt;p&gt;It shows that</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>one 
can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span class="removed"><del><strong>perhaps by the OS 
in the
-      phone.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps</em></ins></span> use <span class="removed"><del><strong>by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+      &lt;p&gt;The FTC criticized this app because it asked the user to
+      approve sending</strong></del></span> <span class="inserted"><ins><em>and
+    misuse users'</em></ins></span> personal <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="inserted"><ins><em>other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> the <span 
class="removed"><del><strong>app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>total) link 
this ID</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>no excuse for malware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it asked the user to
-      approve sending personal data to the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>in apparent violation of
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
     and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
     that</em></ins></span> the
@@ -1280,70 +1308,42 @@
       &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
       app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
     preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware</em></ins></span> 
in <span class="removed"><del><strong>Games&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>interacting 
with the app.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data 
about</strong></del></span> <span class="inserted"><ins><em>often malicious ads 
on users, and redirecting</em></ins></span>
-    them to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,
-    the user interface of most of them was designed to make uninstallation
-    difficult.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span>
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>companies, and</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>companies, and the NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising&mdash;that could
-    potentially also be used</em></ins></span> to spy <span 
class="removed"><del><strong>through it too&lt;/a&gt;.
-      Here's information</strong></del></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
-    found as well.&lt;/p&gt;
-
-    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>spy through it 
too&lt;/a&gt;.
+      Here's information</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half
 of
-    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that these articles talk</em></ins></span> 
about <span class="removed"><del><strong>NSA app 
spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1352,70 +1352,101 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,
+      a speech recognition company based in</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys</strong></del></span> <span 
class="inserted"><ins><em>user interface of most of them was designed to make 
uninstallation
+    difficult.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in</strong></del></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should</em></ins></span> also <span 
class="removed"><del><strong>contain major security vulnerabilities; crackers
+      can remotely control the toys with</strong></del></span> <span 
class="inserted"><ins><em>stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
+      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>toys</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do</em></ins></span>
-    with <span class="inserted"><ins><em>the data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
-      enable crackers to listen in on</strong></del></span> <span 
class="inserted"><ins><em>side issue. What the company does
-    with the data is</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and even speak
-      into</strong></del></span> <span class="inserted"><ins><em>secondary 
issue. The principal wrong here is that</em></ins></span>
-    the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>company gets that data at all.&lt;/p&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; due to DNS 
leaks. In
+    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="inserted"><ins><em>their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    found as well.&lt;/p&gt;
 
-    &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+    &lt;p&gt;Moreover,</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and even speak
+      into the toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half
 of</em></ins></span>
+    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report</em></ins></span> on <span class="removed"><del><strong>its users 
through</strong></del></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
-    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>was surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+  &lt;li id="M201901050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span class="removed"><del><strong>was 
reporting</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>was surrounded by</strong></del></span> <span 
class="inserted"><ins><em>will do
+    with the data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>side issue. What</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>company does
+    with</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>data is</em></ins></span> a <span 
class="removed"><del><strong>labeling
       standard with which manufacturers would make statements about
       their products, rather than free software which users could have
       checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>vibrator
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>secondary issue. The principal wrong here 
is</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span>
+    the <span class="removed"><del><strong>vibrator
       &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>same machine via
-    various apps. Some</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>them send Facebook detailed</em></ins></span> 
information about <span class="removed"><del><strong>how
-       people used it&lt;/a&gt;.&lt;/p&gt;
+       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>company gets that data at all.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement</strong></del></span>
-    <span class="inserted"><ins><em>the user's activities in the app; others 
only say</em></ins></span> that <span class="removed"><del><strong>it was 
anonymizing</strong></del></span> the <span class="removed"><del><strong>data 
may be
-      true,</strong></del></span> <span class="inserted"><ins><em>user is
-    using that app,</em></ins></span> but <span 
class="removed"><del><strong>it doesn't really matter. If it had sold the data 
to a
-      data broker, the data broker would have been able to figure out
-      who</strong></del></span> <span class="inserted"><ins><em>that alone is 
often quite informative.&lt;/p&gt;
+    &lt;p&gt;&lt;a
+    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
+  &lt;/li&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
user <span class="removed"><del><strong>was.&lt;/p&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>it was 
anonymizing</strong></del></span>
+    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the data <span class="removed"><del><strong>may be
+      true, but it doesn't really matter. If</strong></del></span> it <span 
class="removed"><del><strong>had sold</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>data to a
+      data broker,</strong></del></span> <span class="inserted"><ins><em>same 
machine via
+    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
+    the <span class="removed"><del><strong>data broker would have been able to 
figure out
+      who</strong></del></span> <span class="inserted"><ins><em>user's 
activities in the app; others only say that</em></ins></span> the user <span 
class="removed"><del><strong>was.&lt;/p&gt;
     
     &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company</strong></del></span> has <span 
class="removed"><del><strong>been ordered to pay</strong></del></span> a <span 
class="removed"><del><strong>total of C$4m&lt;/a&gt;
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> has <span 
class="removed"><del><strong>been ordered to pay</strong></del></span> a <span 
class="removed"><del><strong>total of C$4m&lt;/a&gt;
       to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
     account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -1462,7 +1493,16 @@
 &lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>save
     a recording. But I can't be</em></ins></span> sure <span 
class="inserted"><ins><em>from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1472,41 +1512,22 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will 
benefit</em></ins></span> in <span class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span 
class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>one 
more.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about</em></ins></span> its <span 
class="removed"><del><strong>own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.  40% of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;</strong></del></span> <span class="inserted"><ins><em>its 
users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>spyware via 
BIOS&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>the 
proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
     the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
@@ -1525,7 +1546,7 @@
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
+    spy</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.</strong></del></span> <span class="inserted"><ins><em>users even more 
than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
@@ -1544,7 +1565,7 @@
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article misuses the words
+    book to developer's server.</em></ins></span>  Note that <span 
class="inserted"><ins><em>this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
@@ -1956,21 +1977,17 @@
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
@@ -2135,28 +2152,47 @@
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches, and the switch to turn this off has
+    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>transmission reports</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is 
not</strong></del></span> <span class="inserted"><ins><em>404 
error</em></ins></span>
+    really
+<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>means nothing; the server could save that data 
anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>user watches, 
and the switch to turn</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>off has
-    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3212,7 +3248,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary-surveillance.it.po      7 Jun 2019 08:33:54 -0000       1.305
+++ proprietary-surveillance.it.po      10 Jun 2019 09:02:21 -0000      1.306
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1228,6 +1228,25 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | The DMCA and the EU Copyright Directive make it <a
 # | href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\";>
 # | illegal to study how iOS [-cr...apps-] {+cr&hellip;apps+} spy on

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary-surveillance.ja-diff.html       7 Jun 2019 08:33:54 -0000       
1.154
+++ proprietary-surveillance.ja-diff.html       10 Jun 2019 09:02:21 -0000      
1.155
@@ -650,14 +650,30 @@
         days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users 
cannot</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive</em></ins></span> make 
<span class="removed"><del><strong>an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="removed"><del><strong>install 
even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving the code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>study how 
iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving a valid</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location,</em></ins></span> email <span 
class="inserted"><ins><em>address, phone number or even
+    delivery</em></ins></span> address <span class="inserted"><ins><em>(in the 
case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> the <span 
class="removed"><del><strong>code</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -666,7 +682,8 @@
     &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    them off&mdash;only until 5am.  That's</em></ins></span> Apple
+      <span class="removed"><del><strong>sends</strong></del></span> <span 
class="inserted"><ins><em>for you&mdash;&ldquo;We
     know you want</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -759,19 +776,19 @@
   <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or it
-    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps the NSA snoop on all the data in an iThing, or 
it</em></ins></span>
+    is <span class="inserted"><ins><em>totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also &lt;a
+    &lt;p&gt;The iThing</em></ins></span> also <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
+    &lt;p&gt;There is also a</em></ins></span> feature for web sites to track 
users, which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
@@ -835,30 +852,34 @@
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
+    &lt;p&gt;An Android phone was observed to track</em></ins></span> location 
<span class="inserted"><ins><em>even while
+    in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
     it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the <span class="removed"><del><strong>contact list. This malware is 
designed to
+      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable</em></ins></span> phones <span 
class="removed"><del><strong>come with</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they send so much</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
@@ -866,20 +887,17 @@
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
+    that users can't delete&lt;/a&gt;, and they send so much data 
that</em></ins></span> their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
     of some
@@ -907,45 +925,40 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
+      remote command and users cannot stop them:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
-      the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
+    &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="inserted"><ins><em>Android 
that &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal</em></ins></span> data <span 
class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;
+    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too:</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
     the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span>
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="inserted"><ins><em>not 
enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
     <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>user's 
list</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
+    reading</em></ins></span> the <span class="removed"><del><strong>use of 
data on</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, 
instead</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span>
-    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
+    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>collects on users, instead of
+    hiding</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
+    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other</strong></del></span> 
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
       numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
@@ -975,34 +988,52 @@
 
         &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
         for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+        surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps that include</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    the e-reader used by most US libraries,</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed to check DRM!&lt;/p&gt;</em></ins></span>
+    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take 
according</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed</em></ins></span> to <span class="removed"><del><strong>who
+      is</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+  &lt;li id="M201212030"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page the user reads at</em></ins></span> what <span 
class="removed"><del><strong>users post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across the wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1020,17 +1051,31 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
+    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span class="removed"><del><strong>article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as</strong></del></span> 
<span class="inserted"><ins><em>making unauthorized copies of nonfree software
+    is not</em></ins></span> a <span class="removed"><del><strong>way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example 
of</strong></del></span> <span class="inserted"><ins><em>cure 
for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
+    apps</strong></del></span> the <span class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1041,359 +1086,478 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections</strong></del></span>
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> <span 
class="inserted"><ins><em>secretly</em></ins></span> a <span 
class="removed"><del><strong>way that at least is visible and
+    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,
-      and suggests</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as</em></ins></span> you <span 
class="inserted"><ins><em>must expect from nonfree
-    programs.&lt;/p&gt;
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by 
the</strong></del></span> <span class="inserted"><ins><em>run a 
proprietary</em></ins></span> phone <span class="removed"><del><strong>company, 
and perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt; to</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>allowed 
into</em></ins></span>
+    the <span class="inserted"><ins><em>event.&lt;/p&gt;
+
+    &lt;p&gt;This</em></ins></span> app <span 
class="removed"><del><strong>developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span> is <span 
class="removed"><del><strong>no excuse for malware.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span class="removed"><del><strong>share 
the picture you take according</strong></del></span> <span 
class="inserted"><ins><em>run a proprietary phone 
app&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>who
-      is in</strong></del></span> <span class="inserted"><ins><em>be allowed 
into</em></ins></span>
-    the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="inserted"><ins><em>app is a</em></ins></span> 
spyware <span class="removed"><del><strong>feature seems to require online 
access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user</strong></del></span> <span class="inserted"><ins><em>a 
spyware that can snoop on a lot of
+    sensitive</em></ins></span> data, including <span 
class="removed"><del><strong>geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span> <span class="inserted"><ins><em>user's location and 
contact list, and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span class="inserted"><ins><em>employers 
and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can 
easily</em></ins></span> be
-      <span class="removed"><del><strong>sent across</strong></del></span>
-    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
-    and <span class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
+    available</em></ins></span> to <span class="inserted"><ins><em>employers 
and insurance companies&lt;/a&gt;. Even though</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="inserted"><ins><em>can 
easily be
+    traced back</em></ins></span> to <span class="removed"><del><strong>other 
companies.  This shows</strong></del></span> the
+      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
 
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>freedom 
to make their own pregnancy choices. Don't use
-    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
-    free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>surveillance: 
why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>equal employment
+    and freedom</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software 
flashlight</strong></del></span> <span class="inserted"><ins><em>make their own 
pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>same 
thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is 
available from &lt;a
-    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>snooping). In August
-      2015 it</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
 
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>new one</em></ins></span> is <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>that does more 
or less the same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and the NSA takes advantage</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information</strong></del></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude</strong></del></span> <span class="inserted"><ins><em>huge 
number</em></ins></span> of <span class="removed"><del><strong>the proprietary 
software industry towards
-      those they</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> <span 
class="inserted"><ins><em>access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden</em></ins></span> apps <span 
class="removed"><del><strong>for mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>may either call 
home with
-    the data, or pass it on to user-installed</em></ins></span> apps <span 
class="inserted"><ins><em>that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which</em></ins></span> the user has
-    <span class="removed"><del><strong>installed.</strong></del></span> <span 
class="inserted"><ins><em>absolutely no control.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps that have access to
+    the network but no direct access to the data. This 
results</em></ins></span> in <span class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+
+   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>massive
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found</em></ins></span> 
that <span class="removed"><del><strong>makes internet-controlled vibrators 
&lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>19</em></ins></span> of <span 
class="inserted"><ins><em>them &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive</em></ins></span> personal <span 
class="removed"><del><strong>information about how
+    people use it&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;The company's statement that it anonymizes 
the</strong></del></span> data <span class="removed"><del><strong>may be
+        true, but</strong></del></span> <span class="inserted"><ins><em>to 
third parties&lt;/a&gt;, which can use</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
+    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>doing this</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span>
-    <span class="inserted"><ins><em>lengthy terms of service</em></ins></span> 
that <span class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>are difficult to understand. In any case,
-    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>visible and
-    optional&lt;/a&gt;. Not as bad as what the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>not 
sufficient to legitimize snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>sells the data</strong></del></span> 
<span class="inserted"><ins><em>is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
-    library</em></ins></span> for <span class="removed"><del><strong>children 
don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="inserted"><ins><em>convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>to Facebook&lt;/a&gt;. Lots of companies built apps 
that
+    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="inserted"><ins><em>personal</em></ins></span>
+    data <span class="removed"><del><strong>broker</strong></del></span> <span 
class="inserted"><ins><em>they collected would go to Facebook as well.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>building mobile apps, which also</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies 
built</em></ins></span> apps <span class="removed"><del><strong>snoop 
on</strong></del></span> <span class="inserted"><ins><em>that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>personal
-    data they collected would go</em></ins></span> to <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+    &lt;p&gt;It shows that no one</em></ins></span> can <span 
class="removed"><del><strong>figure out who</strong></del></span> <span 
class="inserted"><ins><em>trust a nonfree program, not even</em></ins></span> 
the <span class="removed"><del><strong>user is.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>snooping done by 
the phone company,</strong></del></span>
+  &lt;li&gt;&lt;p&gt;A computerized
+        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span class="removed"><del><strong>perhaps 
by</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
-      users</strong></del></span> <span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201902140"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>app 
reports</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by
+      <span class="removed"><del><strong>minute (thus, indirectly, whether 
it</strong></del></span> <span class="inserted"><ins><em>resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>surrounded by a person's
+      body), and the vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in 
apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users can check
+      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>other companies, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
-    that</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
-      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
-      app would not.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
-
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware</em></ins></span> 
in <span class="removed"><del><strong>Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>companies, and</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>spy through it 
too&lt;/a&gt;.
-      Here's information</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>Google Play had one or</em></ins></span> more 
<span class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span> <span class="inserted"><ins><em>malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots</strong></del></span>
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-    people use it&lt;/a&gt;.&lt;/p&gt;
-
-       &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes the data may be
-        true, but it doesn't really matter. If it sells the data to a
-        data broker, the data broker can figure out who</strong></del></span> 
<span class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
-    the user <span 
class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>interface of most of them was designed to make 
uninstallation
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>users, and 
redirecting
+    them to phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
+    there</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span> 
really
+<span class="removed"><del><strong>clean since &lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span>
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+  &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>protect their 
users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> <span 
class="inserted"><ins><em>users. Other technical flaws were
+    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>users. 
Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
-    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>Parliament
+  this way, because</strong></del></span>
+    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+    apps.&rdquo; These apps are gratis, but</em></ins></span> they <span 
class="removed"><del><strong>pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>are &lt;em&gt;not&lt;/em&gt;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201901050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="inserted"><ins><em>will do
-    with the data.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>surrounded by</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> a <span 
class="removed"><del><strong>person's
-      body), and</strong></del></span> <span class="inserted"><ins><em>side 
issue. What</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>data is</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users can check
-      and change.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children</strong></del></span> <span 
class="inserted"><ins><em>secondary issue. The principal wrong here is that
-    the company gets that data at all.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
 
-    &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;.</em></ins></span> The 
<span class="removed"><del><strong>Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>company</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span class="inserted"><ins><em>being sued, demanding that it 
notify</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>will do
+    with</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>using it to outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>about a side issue. 
What</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>company does
+    with</em></ins></span> the <span class="removed"><del><strong>user 
reads</strong></del></span> <span class="inserted"><ins><em>data is a secondary 
issue. The principal wrong here is that
+    the company gets that data</em></ins></span> at <span 
class="removed"><del><strong>what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>all.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather and 
WeatherBug,</em></ins></span> are
+  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>tracking people's 
locations.&lt;/p&gt;</em></ins></span> 
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's actions to 
Facebook&lt;/a&gt;.&lt;/p&gt;
+    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>do because</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same machine via
+    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities in the app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
+    the user's activities</em></ins></span> in the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that the user</em></ins></span> 
is
+    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to</strong></del></span>
+    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810244"&gt;
     &lt;p&gt;Some Android apps &lt;a
     
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+    track</em></ins></span> the <span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>phones 
of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
     &lt;p&gt;Some Google apps on Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+    record</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>user's location 
even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
     tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+    the user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;I expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Proprietary software</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn to care much less about sports, you will 
benefit</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span>
+    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
     of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
+    and collect</em></ins></span> information about <span 
class="removed"><del><strong>drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span> <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
+    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
+      really a matter of</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but the invasion isn't done by 
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
+    source code they cannot look at.</em></ins></span>  The other
+      <span class="removed"><del><strong>cases mentioned are done by 
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps 
might be snooping</em></ins></span>
+    in <span class="removed"><del><strong>the car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
+    their users.  To protect their privacy</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
+    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>c.&lt;/a&gt;). The company says it 
doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>data
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  &lt;li id="M201804020"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;
+    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>place new items on top 
under</strong></del></span> each <span class="removed"><del><strong>subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+    <span class="inserted"><ins><em>other but not</em></ins></span> to <span 
class="removed"><del><strong>spy on</strong></del></span> <span 
class="inserted"><ins><em>the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
@@ -2046,8 +2210,7 @@
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
     passes by, the user's front door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>to let 
individual employees look
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
     at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
@@ -2057,14 +2220,11 @@
     &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
     
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
     give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>&ldquo;clean&rdquo; 
Windows install is</strong></del></span> <span class="inserted"><ins><em>better
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise</em></ins></span> not <span 
class="removed"><del><strong>really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>to look at 
what's</em></ins></span> in <span class="removed"><del><strong>its own 
malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>the videos. That's not
+    manufacturers promise not to look at what's in the videos. That's not
     security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
@@ -2082,14 +2242,11 @@
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span>
 
-
-<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
+&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -2119,341 +2276,213 @@
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure to place new items on top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>statements 
about their
-    products, rather than free software which users could have checked
+    standard with which manufacturers would make statements 
about</em></ins></span> their <span 
class="removed"><del><strong>renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>products, rather than free software which 
users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company that made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>data may be
-    true, but</em></ins></span> it <span class="removed"><del><strong>through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data 
to a data
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
     the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+    customers.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>access the 
data&lt;/a&gt; collected by the
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201612060"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest 
Cam</strong></del></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+  &lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
     company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and</em></ins></span> even 
<span class="removed"><del><strong>when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>speak into</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span>
-    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy 
on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span 
class="removed"><del><strong>e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
-    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
-    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
-    even if <span class="removed"><del><strong>it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
+    recordings</em></ins></span> made <span 
class="inserted"><ins><em>without</em></ins></span> a <span 
class="removed"><del><strong>joke: The</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
     
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>accessed by
+    the data remain on</em></ins></span> other <span 
class="removed"><del><strong>day</strong></del></span> <span 
class="inserted"><ins><em>servers&lt;/a&gt;, where they can be accessed by
     advertising companies and government agencies. In other words,
-    deleting</em></ins></span> the <span class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't cancel the wrong of
+    deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to
-    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
-    at home, not only in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>past 
(and, who knows,
-    in</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As</em></ins></span> a <span class="removed"><del><strong>woman 
came up</strong></del></span> <span class="inserted"><ins><em>result, Amazon 
has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>the Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    recorded for Amazon employees to listen to&lt;/a&gt;. The 
Google</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I 
see</strong></del></span> <span class="inserted"><ins><em>Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
+    tell</em></ins></span> you <span class="inserted"><ins><em>how and where 
it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user is still
-    paying for the subscription,</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
-      really</strong></del></span>
-    <span class="inserted"><ins><em>working order.&lt;/p&gt;
+    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
+    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>use of ink cartridges</em></ins></span> that 
<span class="removed"><del><strong>was
+before</strong></del></span> <span class="inserted"><ins><em>would otherwise 
be in
+    working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
-      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
-    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way to break the security of 
an</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>device,
+    and</em></ins></span> &lt;a <span class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done</strong></del></span> <span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell the product in that country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
+    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  &lt;li id="M201804140"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>malware. The other
-      cases mentioned</strong></del></span>
-    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;
+    offers</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV manufacturers</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that snoops on its user 
by
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>designed &lt;a
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    listen to everyone</em></ins></span> in <span 
class="inserted"><ins><em>the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>car's location 
at</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does not include</em></ins></span> 
any <span class="removed"><del><strong>time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>way of making
-    a device that can obey your voice commands without potentially spying
-    on you.  Even</em></ins></span> if <span class="removed"><del><strong>the 
state orders</strong></del></span> it <span class="removed"><del><strong>to get 
the data
-      and hand</strong></del></span> <span class="inserted"><ins><em>is 
air-gapped,</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>could be saving up records
+    &lt;p&gt;Today's technological practice does not include any way of making
+    a device that can obey your voice commands without 
potentially</em></ins></span> spying
+    on <span class="inserted"><ins><em>you.  Even if it is air-gapped, it 
could be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407170"&gt;
     &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
-    data about</em></ins></span> the <span class="removed"><del><strong>state 
can store it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+  &lt;li id="M201310260"&gt;
+    &lt;p&gt;&lt;a
     
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy on</em></ins></span> their 
<span class="removed"><del><strong>users: their</strong></del></span> <span 
class="inserted"><ins><em>renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="removed"><del><strong>shows that laws requiring 
products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the 
TV</strong></del></span> will
-      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>teach the sheeple to find it normal that companies
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3070,7 +3099,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary-surveillance.ja.po      7 Jun 2019 08:33:54 -0000       1.278
+++ proprietary-surveillance.ja.po      10 Jun 2019 09:02:21 -0000      1.279
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1006,6 +1006,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing.";
 "net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
 "cr&hellip;apps spy on users</a>, because this would require circumventing "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- proprietary-surveillance.pot        7 Jun 2019 08:33:54 -0000       1.226
+++ proprietary-surveillance.pot        10 Jun 2019 09:02:21 -0000      1.227
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -672,6 +672,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a "
+"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\";>
 "
+"sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The DMCA and the EU Copyright Directive make it <a "
 "href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\";> "
 "illegal to study how iOS cr&hellip;apps spy on users</a>, because this would "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.533
retrieving revision 1.534
diff -u -b -r1.533 -r1.534
--- proprietary-surveillance.ru.po      7 Jun 2019 09:33:33 -0000       1.533
+++ proprietary-surveillance.ru.po      10 Jun 2019 09:02:21 -0000      1.534
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -909,6 +910,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing.";
 "net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
 "cr&hellip;apps spy on users</a>, because this would require circumventing "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.de-diff.html    7 Jun 2019 08:33:54 -0000       1.97
+++ proprietary.de-diff.html    10 Jun 2019 09:02:21 -0000      1.98
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -128,16 +128,16 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -186,6 +186,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201906030"&gt;
     &lt;p&gt;Apple can &lt;a
     href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
@@ -238,18 +255,6 @@
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
     inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +315,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary.de.po   7 Jun 2019 08:33:54 -0000       1.139
+++ proprietary.de.po   10 Jun 2019 09:02:21 -0000      1.140
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -439,6 +439,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
 "app/\"> track iMonsters even when they are suspended</a>."
 msgstr ""
@@ -500,22 +519,6 @@
 "even if it didn't lead to security threats as well."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/";
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary.es.po   9 Jun 2019 10:29:05 -0000       1.172
+++ proprietary.es.po   10 Jun 2019 09:02:21 -0000      1.173
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -303,6 +304,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
 "app/\"> track iMonsters even when they are suspended</a>."
 msgstr ""
@@ -400,31 +420,6 @@
 "La censura de aplicaciones de Apple es de por sí injusta, y sería también "
 "injustificable aun cuando no representara una amenaza a la seguridad."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-"BlizzCon 2019 impuso el <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\">requisito de ejecutar una aplicación privativa en el teléfono</a> para "
-"poder participar en el evento."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/";
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-"Esta aplicación es un programa espía capaz de husmear en multitud de datos "
-"sensibles, incluida la localización del usuario y su lista de contactos, y "
-"que toma <a href=\"https://old.reddit.com/r/wow/comments/bkd5ew/";
-"you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">control casi "
-"total</a> del teléfono."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -504,6 +499,30 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\"> requirement to run a proprietary phone app</a> to be allowed into "
+#~ "the event."
+#~ msgstr ""
+#~ "BlizzCon 2019 impuso el <a href=\"https://arstechnica.com/gaming/2019/05/";
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\">requisito de ejecutar una aplicación privativa en el teléfono</a> 
"
+#~ "para poder participar en el evento."
+
+#~ msgid ""
+#~ "This app is a spyware that can snoop on a lot of sensitive data, "
+#~ "including user's location and contact list, and has <a href=\"https://old.";
+#~ "reddit.com/r/wow/comments/bkd5ew/"
+#~ "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> near-"
+#~ "complete control</a> over the phone."
+#~ msgstr ""
+#~ "Esta aplicación es un programa espía capaz de husmear en multitud de "
+#~ "datos sensibles, incluida la localización del usuario y su lista de "
+#~ "contactos, y que toma <a href=\"https://old.reddit.com/r/wow/comments/";
+#~ "bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+#~ "\">control casi total</a> del teléfono."
+
+#~ msgid ""
 #~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
 #~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
 #~ "company made them all cease to work</a> by shutting down that server."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary.fr.po   7 Jun 2019 10:26:48 -0000       1.212
+++ proprietary.fr.po   10 Jun 2019 09:02:21 -0000      1.213
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2019-06-07 12:25+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -299,6 +300,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
 "app/\"> track iMonsters even when they are suspended</a>."
 msgstr ""
@@ -395,31 +415,6 @@
 "inexcusable même si elle n'entraînait pas, en plus, des menaces pour la "
 "sécurité."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-"La BlizzCon 2019 a imposé <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\">l'utilisation d'une appli mobile privatrice</a> pour accéder à "
-"l'événement."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/";
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-"Cette appli est un logiciel espion qui peut récupérer une grande quantité 
de "
-"données sensibles, en particulier la localisation de l'utilisateur et son "
-"carnet d'adresses, et qui a un <a href=\"https://old.reddit.com/r/wow/";
-"comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\">contrôle presque complet</a> du téléphone."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -493,3 +488,27 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\"> requirement to run a proprietary phone app</a> to be allowed into "
+#~ "the event."
+#~ msgstr ""
+#~ "La BlizzCon 2019 a imposé <a href=\"https://arstechnica.com/";
+#~ "gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-"
+#~ "reviewed-smartphone-app/\">l'utilisation d'une appli mobile privatrice</"
+#~ "a> pour accéder à l'événement."
+
+#~ msgid ""
+#~ "This app is a spyware that can snoop on a lot of sensitive data, "
+#~ "including user's location and contact list, and has <a href=\"https://old.";
+#~ "reddit.com/r/wow/comments/bkd5ew/"
+#~ "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> near-"
+#~ "complete control</a> over the phone."
+#~ msgstr ""
+#~ "Cette appli est un logiciel espion qui peut récupérer une grande 
quantité "
+#~ "de données sensibles, en particulier la localisation de l'utilisateur et "
+#~ "son carnet d'adresses, et qui a un <a href=\"https://old.reddit.com/r/wow/";
+#~ "comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+#~ "\">contrôle presque complet</a> du téléphone."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.it-diff.html    7 Jun 2019 08:33:54 -0000       1.109
+++ proprietary.it-diff.html    10 Jun 2019 09:02:21 -0000      1.110
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,13 +40,13 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
@@ -185,6 +185,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201906030"&gt;
     &lt;p&gt;Apple can &lt;a
     href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
@@ -237,18 +254,6 @@
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
     inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -309,7 +314,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.it.po   7 Jun 2019 08:33:54 -0000       1.148
+++ proprietary.it.po   10 Jun 2019 09:02:21 -0000      1.149
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
 "app/\"> track iMonsters even when they are suspended</a>."
 msgstr ""
@@ -504,22 +523,6 @@
 "even if it didn't lead to security threats as well."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/";
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary.ja-diff.html    7 Jun 2019 08:33:54 -0000       1.110
+++ proprietary.ja-diff.html    10 Jun 2019 09:02:21 -0000      1.111
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -182,6 +182,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201906030"&gt;
     &lt;p&gt;Apple can &lt;a
     href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
@@ -234,18 +251,6 @@
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
     inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -306,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary.ja.po   7 Jun 2019 08:33:54 -0000       1.131
+++ proprietary.ja.po   10 Jun 2019 09:02:21 -0000      1.132
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -361,6 +361,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
 "app/\"> track iMonsters even when they are suspended</a>."
 msgstr ""
@@ -422,22 +441,6 @@
 "even if it didn't lead to security threats as well."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/";
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.nl-diff.html    7 Jun 2019 08:33:54 -0000       1.109
+++ proprietary.nl-diff.html    10 Jun 2019 09:02:21 -0000      1.110
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,13 +40,13 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
@@ -185,6 +185,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201906030"&gt;
     &lt;p&gt;Apple can &lt;a
     href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
@@ -237,18 +254,6 @@
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
     inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -309,7 +314,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary.nl.po   7 Jun 2019 08:33:54 -0000       1.120
+++ proprietary.nl.po   10 Jun 2019 09:02:21 -0000      1.121
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
 "app/\"> track iMonsters even when they are suspended</a>."
 msgstr ""
@@ -497,22 +516,6 @@
 "even if it didn't lead to security threats as well."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/";
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary.pl-diff.html    7 Jun 2019 08:33:54 -0000       1.127
+++ proprietary.pl-diff.html    10 Jun 2019 09:02:21 -0000      1.128
@@ -127,18 +127,18 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -183,6 +183,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201906030"&gt;
     &lt;p&gt;Apple can &lt;a
     href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
@@ -235,18 +252,6 @@
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
     inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -307,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary.pl.po   7 Jun 2019 08:33:54 -0000       1.115
+++ proprietary.pl.po   10 Jun 2019 09:02:21 -0000      1.116
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
 "app/\"> track iMonsters even when they are suspended</a>."
 msgstr ""
@@ -580,22 +599,6 @@
 "even if it didn't lead to security threats as well."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/";
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary.pot     7 Jun 2019 08:33:54 -0000       1.112
+++ proprietary.pot     10 Jun 2019 09:02:21 -0000      1.113
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -249,6 +249,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a "
+"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\";>
 "
+"sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a "
 "href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\";> track "
 "iMonsters even when they are suspended</a>."
@@ -310,21 +329,6 @@
 "even if it didn't lead to security threats as well."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a "
-"href=\"https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/\";>
 "
-"requirement to run a proprietary phone app</a> to be allowed into the event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a "
-"href=\"https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\";>
 "
-"near-complete control</a> over the phone."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- proprietary.pt-br.po        7 Jun 2019 08:33:54 -0000       1.171
+++ proprietary.pt-br.po        10 Jun 2019 09:02:21 -0000      1.172
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2019-05-20 00:20-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -297,6 +297,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
 "app/\"> track iMonsters even when they are suspended</a>."
 msgstr ""
@@ -364,31 +383,6 @@
 "A censura de aplicativos pela Apple é fundamentalmente injusta e seria "
 "indesculpável, mesmo que não levasse também a ameaças de segurança."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-"A BlizzCon 2019 impôs um <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requisito de executar um aplicativo proprietário de telefone</a> para "
-"ser aceito no evento."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/";
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-"Esse aplicativo é um <i lang=\"en\">spyware</i> que consegue bisbilhotar "
-"vários dados sensíveis, incluindo a localização e a lista de contato do "
-"usuário, e tem <a href=\"https://old.reddit.com/r/wow/comments/bkd5ew/";
-"you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> controle quase "
-"completo</a> sobre seu telefone."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -464,6 +458,30 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\"> requirement to run a proprietary phone app</a> to be allowed into "
+#~ "the event."
+#~ msgstr ""
+#~ "A BlizzCon 2019 impôs um <a 
href=\"https://arstechnica.com/gaming/2019/05/";
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\"> requisito de executar um aplicativo proprietário de telefone</a> "
+#~ "para ser aceito no evento."
+
+#~ msgid ""
+#~ "This app is a spyware that can snoop on a lot of sensitive data, "
+#~ "including user's location and contact list, and has <a href=\"https://old.";
+#~ "reddit.com/r/wow/comments/bkd5ew/"
+#~ "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> near-"
+#~ "complete control</a> over the phone."
+#~ msgstr ""
+#~ "Esse aplicativo é um <i lang=\"en\">spyware</i> que consegue bisbilhotar "
+#~ "vários dados sensíveis, incluindo a localização e a lista de contato 
do "
+#~ "usuário, e tem <a href=\"https://old.reddit.com/r/wow/comments/bkd5ew/";
+#~ "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> controle "
+#~ "quase completo</a> sobre seu telefone."
+
+#~ msgid ""
 #~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
 #~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
 #~ "company made them all cease to work</a> by shutting down that server."

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary.ru.po   7 Jun 2019 09:33:33 -0000       1.248
+++ proprietary.ru.po   10 Jun 2019 09:02:21 -0000      1.249
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
 "app/\"> track iMonsters even when they are suspended</a>."
 msgstr ""
@@ -398,31 +418,6 @@
 "было бы извинить, даже если из-за этого не 
возникали бы еще и угрозы "
 "безопасности."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-"BlizzCon&ndash;2019 налагала <a href=\"https://arstechnica.com/";
-"gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-"
-"smartphone-app/\"> требование работать с 
несвободным приложением на "
-"телефоне</a>, чтобы получить пропуск на 
мероприятие."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/";
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-"Это приложение&nbsp;&mdash; программа-шпион, 
которая может заглядывать в "
-"массу конфиденциальных данных, в том 
числе местоположение пользователя и "
-"адресную книжку. Оно также <a 
href=\"https://old.reddit.com/r/wow/comments/";
-"bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> 
почти "
-"полностью контролирует</a> телефон."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -502,6 +497,30 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\"> requirement to run a proprietary phone app</a> to be allowed into "
+#~ "the event."
+#~ msgstr ""
+#~ "BlizzCon&ndash;2019 налагала <a href=\"https://arstechnica.com/";
+#~ "gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-"
+#~ "reviewed-smartphone-app/\"> требование работать с 
несвободным приложением "
+#~ "на телефоне</a>, чтобы получить пропуск на 
мероприятие."
+
+#~ msgid ""
+#~ "This app is a spyware that can snoop on a lot of sensitive data, "
+#~ "including user's location and contact list, and has <a href=\"https://old.";
+#~ "reddit.com/r/wow/comments/bkd5ew/"
+#~ "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> near-"
+#~ "complete control</a> over the phone."
+#~ msgstr ""
+#~ "Это приложение&nbsp;&mdash; программа-шпион, 
которая может заглядывать в "
+#~ "массу конфиденциальных данных, в том 
числе местоположение пользователя и "
+#~ "адресную книжку. Оно также <a 
href=\"https://old.reddit.com/r/wow/";
+#~ "comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+#~ "\"> почти полностью контролирует</a> 
телефон."
+
+#~ msgid ""
 #~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
 #~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
 #~ "company made them all cease to work</a> by shutting down that server."

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary.zh-tw-diff.html 7 Jun 2019 08:33:54 -0000       1.87
+++ proprietary.zh-tw-diff.html 10 Jun 2019 09:02:21 -0000      1.88
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -128,16 +128,16 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -186,6 +186,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201906030"&gt;
     &lt;p&gt;Apple can &lt;a
     href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
@@ -238,18 +255,6 @@
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
     inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +315,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary.zh-tw.po        7 Jun 2019 08:33:54 -0000       1.98
+++ proprietary.zh-tw.po        10 Jun 2019 09:02:22 -0000      1.99
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
 "app/\"> track iMonsters even when they are suspended</a>."
 msgstr ""
@@ -411,22 +430,6 @@
 "even if it didn't lead to security threats as well."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/";
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- pt-br.po    8 Jun 2019 08:31:14 -0000       1.122
+++ pt-br.po    10 Jun 2019 09:02:22 -0000      1.123
@@ -1153,6 +1153,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- ru.po       8 Jun 2019 11:02:50 -0000       1.207
+++ ru.po       10 Jun 2019 09:02:22 -0000      1.208
@@ -1488,6 +1488,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- zh-tw.po    8 Jun 2019 08:31:14 -0000       1.94
+++ zh-tw.po    10 Jun 2019 09:02:22 -0000      1.95
@@ -1111,6 +1111,25 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice.";
 "com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
 "\">reports the user's browsing history</a>."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]