www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.es.html malware-a...


From: GNUN
Subject: www/proprietary malware-apple.es.html malware-a...
Date: Wed, 10 Jul 2019 09:00:28 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/07/10 09:00:27

Modified files:
        proprietary    : malware-apple.es.html malware-apple.fr.html 
                         malware-apple.ru.html 
                         proprietary-surveillance.fr.html 
                         proprietary-surveillance.ru.html 
                         proprietary.es.html proprietary.fr.html 
                         proprietary.pt-br.html proprietary.ru.html 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es-en.html malware-apple.es.po 
                         malware-apple.fr-en.html malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.ru-en.html 
                         malware-apple.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr-en.html 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru-en.html 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es-en.html proprietary.es.po 
                         proprietary.fr-en.html proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br-en.html 
                         proprietary.pt-br.po proprietary.ru-en.html 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ru.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.pt-br.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru-en.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.297&r2=1.298
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.448&r2=1.449
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.543&r2=1.544
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-en.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.103&r2=1.104

Patches:
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- malware-apple.es.html       1 Jul 2019 09:29:16 -0000       1.73
+++ malware-apple.es.html       10 Jul 2019 13:00:22 -0000      1.74
@@ -524,16 +524,6 @@
 <h3 id="surveillance">Vigilancia</h3>
 
 <ul class="blurbs">
-  <li id="M201906030">
-    <p>Apple puede <a
-href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>rastrear
-los iMonsturos incluso cuando se encuentran en modo 
<em>suspendido</em></a>.</p>
-
-    <p>Se dice que esta red de bluetooth distribuida es «segura», pero 
obviamente
-<em>no</em> lo es frente a Apple o los Gobiernos que puedan exigir
-obediencia a Apple (como EE.UU. o China).</p>
-  </li>
-
   <li id="M201905280">
     <p>A pesar del supuesto compromiso de Apple con la privacidad, hay 
aplicaciones
 para el iPhone que contienen rastreadores que funcionan por la noche y <a
@@ -820,7 +810,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/07/01 09:29:16 $
+$Date: 2019/07/10 13:00:22 $
 
 <!-- timestamp end -->
 </p>

Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- malware-apple.fr.html       27 Jun 2019 09:29:34 -0000      1.82
+++ malware-apple.fr.html       10 Jul 2019 13:00:22 -0000      1.83
@@ -527,16 +527,6 @@
 <h3 id="surveillance">Surveillance</h3>
 
 <ul class="blurbs">
-  <li id="M201906030">
-    <p>Apple peut <a
-href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>pister
-les iMonstres même lorsqu'ils sont en mode <cite>suspend</cite></a>.</p>
-
-    <p>Ce réseau Bluetooth distribué a la réputation d'être « 
sécurisé », mais à
-l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des États 
qui
-peuvent forcer Apple à leur obéir (comme les États-Unis ou la Chine).</p>
-  </li>
-
   <li id="M201905280">
     <p>En dépit de l'engagement supposé d'Apple sur la confidentialité, les 
applis
 de l'iPhone contiennent des pisteurs qui sont très occupés la nuit à <a
@@ -824,7 +814,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/06/27 09:29:34 $
+$Date: 2019/07/10 13:00:22 $
 
 <!-- timestamp end -->
 </p>

Index: malware-apple.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ru.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-apple.ru.html       27 Jun 2019 09:29:34 -0000      1.79
+++ malware-apple.ru.html       10 Jul 2019 13:00:22 -0000      1.80
@@ -519,16 +519,6 @@
 <h3 id="surveillance">Слежка</h3>
 
 <ul class="blurbs">
-  <li id="M201906030">
-    <p>Apple может <a
-href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-отслежвать ай-чудищ, даже когда они в 
спящем режиме</a>.</p>
-
-    <p>Говорят, что эта распределенная сеть 
Bluetooth &ldquo;защищена&rdquo;, но
-она с очевидностью <em>не</em> защищена от Apple 
или правящих режимов,
-которые могут подчинить себе Apple (таких как 
США и Китай).</p>
-  </li>
-
   <li id="M201905280">
     <p>Несмотря на то, что компания Apple якобы 
стоит на страже неприкосновенности
 личной жизни, в приложениях iPhone есть 
программы отслеживания, которые по
@@ -813,7 +803,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/06/27 09:29:34 $
+$Date: 2019/07/10 13:00:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary-surveillance.fr.html    27 Jun 2019 14:00:27 -0000      1.192
+++ proprietary-surveillance.fr.html    10 Jul 2019 13:00:22 -0000      1.193
@@ -512,16 +512,6 @@
 </div>
 
 <ul class="blurbs">
-  <li id="M201906030">
-    <p>Apple peut <a
-href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>pister
-les iMonstres même lorsqu'ils sont en mode <cite>suspend</cite></a>.</p>
-
-    <p>Ce réseau Bluetooth distribué a la réputation d'être « 
sécurisé », mais à
-l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des États 
qui
-peuvent forcer Apple à leur obéir (comme les États-Unis ou la Chine).</p>
-  </li>
-
   <li id="M201905280">
     <p>En dépit de l'engagement supposé d'Apple sur la confidentialité, les 
applis
 de l'iPhone contiennent des pisteurs qui sont très occupés la nuit à <a
@@ -2553,7 +2543,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/06/27 14:00:27 $
+$Date: 2019/07/10 13:00:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary-surveillance.ru.html    27 Jun 2019 14:00:27 -0000      1.204
+++ proprietary-surveillance.ru.html    10 Jul 2019 13:00:22 -0000      1.205
@@ -510,16 +510,6 @@
 </div>
 
 <ul class="blurbs">
-  <li id="M201906030">
-    <p>Apple может <a
-href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-отслежвать ай-чудищ, даже когда они в 
спящем режиме</a>.</p>
-
-    <p>Говорят, что эта распределенная сеть 
Bluetooth &ldquo;защищена&rdquo;, но
-она с очевидностью <em>не</em> защищена от Apple 
или правящих режимов,
-которые могут подчинить себе Apple (таких как 
США и Китай).</p>
-  </li>
-
   <li id="M201905280">
     <p>Несмотря на то, что компания Apple якобы 
стоит на страже неприкосновенности
 личной жизни, в приложениях iPhone есть 
программы отслеживания, которые по
@@ -2527,7 +2517,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/06/27 14:00:27 $
+$Date: 2019/07/10 13:00:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary.es.html 1 Jul 2019 09:29:17 -0000       1.59
+++ proprietary.es.html 10 Jul 2019 13:00:22 -0000      1.60
@@ -207,16 +207,6 @@
 información, no hay manera de saber para qué va a utilizarla.</p>
   </li>
 
-  <li id="M201906030">
-    <p>Apple puede <a
-href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>rastrear
-los iMonsturos incluso cuando se encuentran en modo 
<em>suspendido</em></a>.</p>
-
-    <p>Se dice que esta red de bluetooth distribuida es «segura», pero 
obviamente
-<em>no</em> lo es frente a Apple o los Gobiernos que puedan exigir
-obediencia a Apple (como EE.UU. o China).</p>
-  </li>
-
   <li id="M201905300">
     <p>La aplicación de «fertilidad» Femm sirve suprepticiamente como <a
 
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>instrumento
@@ -226,6 +216,28 @@
     <p>Además, espía a los usuarios, como cabe esperar de cualquier programa 
que no
 sea libre.</p>
   </li>
+
+  <li id="M201905061">
+    <p>Amazon Alexa recoge de los usuarios mucha más información de la 
necesaria
+para su correcto funcionamiento (hora, localización, grabaciones realizadas
+sin una orden explícita), y la envía a los servidores de Amazon, que la
+guardan indefinidamente. Aún más, Amazon la reenvía a otras compañías. De
+este modo, aun cuando los usuarios soliciten que se borren sus datos de los
+servidores de Amazon, <a
+href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>esos
+datos permanecerán en otros servidores</a>, quedando así al alcance de
+compañías publicitarias y agencias gubernamentales. En otras palabras,
+borrar la información recopilada no deshace el daño causado al 
recopilarla.</p>
+
+    <p>Los datos recopilados por dispositivos como el termostato Nest, el 
sistema
+de iluminación Philips Hue, el controlador para puertas de garaje
+Chamberlain MyQ y los altavoces Sonos se guardan también más tiempo del
+necesario en los servidores a los que tales dispositivos están
+conectados. Más aún, esos datos quedan a disposición de Alexa. En
+consecuencia, Amazon tiene una precisa imagen de la vida del usuario en su
+hogar, no solo en el presente, sino también en el pasado (y, quién sabe si
+también en el futuro).</p>
+  </li>
 </ul>
 
 
@@ -305,7 +317,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/07/01 09:29:17 $
+$Date: 2019/07/10 13:00:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.fr.html 30 Jun 2019 13:29:37 -0000      1.105
+++ proprietary.fr.html 10 Jul 2019 13:00:22 -0000      1.106
@@ -208,16 +208,6 @@
 son utilisation.</p>
   </li>
 
-  <li id="M201906030">
-    <p>Apple peut <a
-href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>pister
-les iMonstres même lorsqu'ils sont en mode <cite>suspend</cite></a>.</p>
-
-    <p>Ce réseau Bluetooth distribué a la réputation d'être « 
sécurisé », mais à
-l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des États 
qui
-peuvent forcer Apple à leur obéir (comme les États-Unis ou la Chine).</p>
-  </li>
-
   <li id="M201905300">
     <p>L'appli de fertilité « Femm » sert secrètement d'<a
 
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>instrument
@@ -227,6 +217,26 @@
     <p>De plus, elle espionne les utilisatrices, comme on peut s'y attendre de 
la
 part d'un programme non libre.</p>
   </li>
+
+  <li id="M201905061">
+    <p>Alexa, l'assistant vocal d'Amazon, récolte beaucoup plus d'information 
que
+nécessaire (heure, localisation, enregistrements déclenchés sans mot-clé
+valable), puis l'envoie aux serveurs d'Amazon où elle est conservée
+indéfiniment. Pire, Amazon la transmet à des sociétés tierces. Ainsi, même
+si les utilisateurs demandent la suppression de leurs données sur les
+serveurs d'Amazon, <a
+href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>elles
+restent sur d'autres serveurs</a> où des publicitaires et des services
+gouvernementaux peuvent les récupérer. En d'autres termes, la suppression de
+l'information récoltée n'annule pas le mal causé par sa collecte.</p>
+
+    <p>Les données collectées par des appareils comme le thermostat Nest, les
+ampoules connectées Philips Hue, la commande de porte de garage MyQ de
+Chamberlain et les haut-parleurs Sonos sont également conservées plus
+longtemps que nécessaire. De plus, Alexa y a accès. Tout ceci donne à Amazon
+une idée très précise de la vie des habitants de la maison, non seulement au
+moment présent, mais aussi dans le passé (et, qui sait, dans le futur ?)</p>
+  </li>
 </ul>
 
 
@@ -306,7 +316,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/06/30 13:29:37 $
+$Date: 2019/07/10 13:00:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.pt-br.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary.pt-br.html      1 Jul 2019 22:58:33 -0000       1.50
+++ proprietary.pt-br.html      10 Jul 2019 13:00:22 -0000      1.51
@@ -206,16 +206,6 @@
 é coletada pela empresa, não há como dizer para que ela será usada.</p>
   </li>
 
-  <li id="M201906030">
-    <p>A Apple pode <a
-href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-rastrear iMonstros mesmo quando eles estão suspensos</a>.</p>
-
-    <p>Esta rede Bluetooth distribuída é considerada “segura”, mas 
obviamente
-<em>não</em> é seguro da Apple ou de governos que possam comandar a
-obediência da Apple (como os EUA e a China).</p>
-  </li>
-
   <li id="M201905300">
     <p>O aplicativo de “fertilidade” Femm é secretamente uma <a
 
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
@@ -225,6 +215,27 @@
     <p>Ele espiona os usuários também, como você deve esperar de programas 
não
 livres.</p>
   </li>
+
+  <li id="M201905061">
+    <p>O Amazon Alexa coleta muito mais informações dos usuários do que o
+necessário para o funcionamento correto (hora, local, gravações feitas sem
+uma solicitação legítima) e as envia para os servidores da Amazon, que os
+armazenam indefinidamente. Pior ainda, a Amazon encaminha para empresas
+terceirizadas. Assim, mesmo que os usuários solicitem a exclusão de seus
+dados dos servidores da Amazon, <a
+href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>
+os dados permanecem em outros servidores</a>, onde eles podem ser acessados
+por empresas de publicidade e agências governamentais. Em outras palavras,
+excluir as informações coletadas não cancela o erro de coletá-las.</p>
+
+    <p>Os dados coletados por dispositivos como o termostato Nest, as luzes
+conectadas a Philips Hue, o abridor de garagem Chamberlain MyQ e os
+alto-falantes da Sonos também são armazenados por mais tempo do que o
+necessário nos servidores aos quais os dispositivos estão ligados. Além
+disso, eles são disponibilizados para o Alexa. Como resultado, a Amazon tem
+uma imagem muito precisa da vida dos usuários em casa, não apenas no
+presente, mas no passado (e, quem sabe, no futuro também?)</p>
+  </li>
 </ul>
 
 
@@ -303,7 +314,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2019/07/01 22:58:33 $
+$Date: 2019/07/10 13:00:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.ru.html 30 Jun 2019 08:58:55 -0000      1.105
+++ proprietary.ru.html 10 Jul 2019 13:00:22 -0000      1.106
@@ -212,16 +212,6 @@
 компанией, невозможно сказать, для чего ее 
будут использовать.</p>
   </li>
 
-  <li id="M201906030">
-    <p>Apple может <a
-href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-отслежвать ай-чудищ, даже когда они в 
спящем режиме</a>.</p>
-
-    <p>Говорят, что эта распределенная сеть 
Bluetooth &ldquo;защищена&rdquo;, но
-она с очевидностью <em>не</em> защищена от Apple 
или правящих режимов,
-которые могут подчинить себе Apple (таких как 
США и Китай).</p>
-  </li>
-
   <li id="M201905300">
     <p>Приложение &ldquo;рождаемости&rdquo; Femm в 
тайне является <a
 
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
@@ -231,6 +221,27 @@
     <p>Оно еще и подглядывает за 
пользователями, как и следует ожидать от
 несвободных программ.</p>
   </li>
+
+  <li id="M201905061">
+    <p>Amazon Alexa собирает гораздо больше 
информации о пользователях, чем
+необходимо для правильного 
функционирования (время, место, записи, 
сделанные
+без надлежащего уведомления), и отправляет 
ее на серверы Amazon, которые
+хранят их неопределенное время. Хуже того, 
Amazon пересылает ее в другие
+компании. Тем самым, даже если 
пользователи запрашивают удаление своих
+данных с серверов Amazon <a
+href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>
+данные остаются на других серверах</a>, где 
их могут получать рекламные
+компании, а также государственные органы. 
Другими словами, удаление
+собранной информации не прекращает вреда 
от ее сбора.</p>
+
+    <p>Данные, собранные такими устройствами 
как термостат Nest, сетевые
+светильники Philips Hue, устройство открывания 
гаража Chamberlain MyQ и
+колонки Sonos таким же образом хранятся 
дольше, чем необходимо, на серверах,
+к которым привязаны эти устройства. Более 
того, их передают в Alexa. В
+результате у Amazon появляется очень точная 
картина домашней жизни
+пользователя, не только в настоящем, но и в 
прошлом (и&nbsp;&mdash; кто
+знает?&nbsp;&mdash; может быть, и в будущем).</p>
+  </li>
 </ul>
 
 
@@ -312,7 +323,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/06/30 08:58:55 $
+$Date: 2019/07/10 13:00:22 $
 
 <!-- timestamp end -->
 </p>

Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- po/de.po    30 Jun 2019 08:29:20 -0000      1.104
+++ po/de.po    10 Jul 2019 13:00:22 -0000      1.105
@@ -1720,19 +1720,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- po/es.po    1 Jul 2019 09:29:17 -0000       1.141
+++ po/es.po    10 Jul 2019 13:00:22 -0000      1.142
@@ -1516,25 +1516,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple puede <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
-"my-app/\">rastrear los iMonsturos incluso cuando se encuentran en modo "
-"<em>suspendido</em></a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Se dice que esta red de bluetooth distribuida es «segura», pero obviamente "
-"<em>no</em> lo es frente a Apple o los Gobiernos que puedan exigir "
-"obediencia a Apple (como EE.UU. o China)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
@@ -10494,6 +10475,23 @@
 "procesadores Intel incorporarán software tirano</a>."
 
 #~ msgid ""
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple puede <a href=\"https://www.macrumors.com/2019/06/03/apples-new-";
+#~ "find-my-app/\">rastrear los iMonsturos incluso cuando se encuentran en "
+#~ "modo <em>suspendido</em></a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Se dice que esta red de bluetooth distribuida es «segura», pero "
+#~ "obviamente <em>no</em> lo es frente a Apple o los Gobiernos que puedan "
+#~ "exigir obediencia a Apple (como EE.UU. o China)."
+
+#~ msgid ""
 #~ "This may have improved with <a href=\"http://www.washingtonpost.com/";
 #~ "business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story."
 #~ "html\"> iOS 8 security improvements</a>; but <a href=\"https://firstlook.";

Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- po/fr.po    30 Jun 2019 13:07:08 -0000      1.181
+++ po/fr.po    10 Jul 2019 13:00:22 -0000      1.182
@@ -1466,25 +1466,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple peut <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\">pister les iMonstres même lorsqu'ils sont en mode <cite>suspend</"
-"cite></a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Ce réseau Bluetooth distribué a la réputation d'être « sécurisé », 
mais à "
-"l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des États 
qui "
-"peuvent forcer Apple à leur obéir (comme les États-Unis ou la Chine)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
@@ -10540,3 +10521,20 @@
 msgstr ""
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>Les "
 "processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid ""
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple peut <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\">pister les iMonstres même lorsqu'ils sont en mode "
+#~ "<cite>suspend</cite></a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Ce réseau Bluetooth distribué a la réputation d'être « sécurisé 
», mais à "
+#~ "l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des 
États "
+#~ "qui peuvent forcer Apple à leur obéir (comme les États-Unis ou la 
Chine)."

Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- po/it.po    30 Jun 2019 08:29:21 -0000      1.104
+++ po/it.po    10 Jul 2019 13:00:22 -0000      1.105
@@ -1705,19 +1705,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- po/ja.po    30 Jun 2019 08:29:21 -0000      1.110
+++ po/ja.po    10 Jul 2019 13:00:22 -0000      1.111
@@ -1305,19 +1305,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- po/malware-apple.de-diff.html       27 Jun 2019 08:02:20 -0000      1.37
+++ po/malware-apple.de-diff.html       10 Jul 2019 13:00:22 -0000      1.38
@@ -571,54 +571,45 @@
 
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
 solely to</strong></del></span> <span class="inserted"><ins><em>point 
that</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt; by being designed 
to</strong></del></span> <span class="inserted"><ins><em>should
     not</em></ins></span> be <span class="removed"><del><strong>incompatible 
with all
-other options, ethical or unethical.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
-formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means
-of converting them</strong></del></span> <span 
class="inserted"><ins><em>allowed</em></ins></span> to <span 
class="removed"><del><strong>or from Open Document Formats&lt;/a&gt;. iWork 
formats
-have changed several times since they were first introduced. This 
may</strong></del></span> <span class="inserted"><ins><em>censor apps.  Even if 
Apple carried out this act of
+other options, ethical</strong></del></span> <span 
class="inserted"><ins><em>allowed to censor apps.  Even if Apple carried out 
this act of
     censorship with some care, it would still be wrong.  Whether racism
     is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not</em></ins></span> have
-<span class="removed"><del><strong>had</strong></del></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>power to impose its views
-    about either</em></ins></span> of <span 
class="removed"><del><strong>thwarting &lt;a
-href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
-efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
-
-&lt;p&gt;iWork formats are considered &lt;a
-href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
-unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>these questions, or any 
other.&lt;/p&gt;</em></ins></span>
+    the real issue.  Apple should not have the power to impose its views
+    about either of these questions,</em></ins></span> or <span 
class="removed"><del><strong>unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>any other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;In MacOS</strong></del></span>
+&lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
+formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>iOS,</strong></del></span> <span 
class="inserted"><ins><em>inconsistent censorship&lt;/a&gt;.&lt;/p&gt;
+    More examples</em></ins></span> of <span 
class="removed"><del><strong>converting them</strong></del></span> <span 
class="inserted"><ins><em>Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>or from Open Document Formats&lt;/a&gt;. 
iWork formats
+have changed several times since they were first introduced. This may have
+had</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>procedure</strong></del></span> <span 
class="inserted"><ins><em>iThings</em></ins></span> for <span 
class="inserted"><ins><em>a time.  It also</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-converting images from</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>iThings for a time.  It also &lt;a
+    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
     killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>Photos format&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>locations
-    of US drone assassinations, giving various excuses. Each
+    &lt;p&gt;Apple rejected an app that displayed the 
locations</em></ins></span>
+    of <span class="removed"><del><strong>thwarting</strong></del></span> 
<span class="inserted"><ins><em>US drone assassinations, giving various 
excuses. Each
     time the developers fixed one &ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection, Apple &lt;a
-    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    complained about another.  After the fifth rejection, 
Apple</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse
 engineering
+efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
+
+&lt;p&gt;iWork formats</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
     admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -628,60 +619,69 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users, or make option settings 
hard</em></ins></span>
-    to <span class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This allows</em></ins></span> a <span 
class="removed"><del><strong>free format is so tedious
-and time-consuming that</strong></del></span> <span 
class="inserted"><ins><em>company such as Apple to say, &ldquo;We 
allow</em></ins></span> users <span 
class="removed"><del><strong>just</strong></del></span>
-    <span class="inserted"><ins><em>to turn this off&rdquo; while ensuring 
that few will understand how
-    to actually turn it off.&lt;/p&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo;</em></ins></span> are <span 
class="removed"><del><strong>considered</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
+unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed to mislead users, or make option settings hard
+    to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;In MacOS and iOS,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
 
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of</em></ins></span> the <span 
class="removed"><del><strong>procedure for</strong></del></span> <span 
class="inserted"><ins><em>software.  This section reports examples of hard sell 
and other unjust commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
-    &lt;p&gt;Apple Siri &lt;a
-    
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
-    to</em></ins></span> give <span 
class="removed"><del><strong>up</strong></del></span> <span 
class="inserted"><ins><em>you information&lt;/a&gt; about music 
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot 
of them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>you're 
not an Apple
-    Music subscriber.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Apple Siri</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
+converting images from the Photos format&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
+    to <span class="removed"><del><strong>a free format is so 
tedious</strong></del></span> <span class="inserted"><ins><em>give you 
information&lt;/a&gt; about music charts if you're not an Apple
+    Music subscriber.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="drm"&gt;Apple DRM&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iTunes videos have DRM,</strong></del></span> <span 
class="inserted"><ins><em>id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-&lt;p&gt;These are situations in</em></ins></span> which <span 
class="removed"><del><strong>allows</strong></del></span> Apple <span 
class="inserted"><ins><em>employs its power over users
+&lt;p&gt;These are situations in which Apple employs its power over users
 to directly intervene in ways that harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201810240"&gt;
-    &lt;p&gt;Apple and Samsung deliberately &lt;a
+    &lt;p&gt;Apple</em></ins></span> and <span 
class="removed"><del><strong>time-consuming that users just give up if they 
have a lot</strong></del></span> <span class="inserted"><ins><em>Samsung 
deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
-    the performance of older phones to force users</em></ins></span> to <span 
class="inserted"><ins><em>buy their newer
-    phones&lt;/a&gt;.&lt;/p&gt;
+    the performance</em></ins></span> of <span 
class="removed"><del><strong>them.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>older phones to force users to buy their newer
+    phones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201805310"&gt;
-    &lt;p&gt;Apple has</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading</em></ins></span> its <span 
class="removed"><del><strong>customers can
-  watch the videos</strong></del></span> <span class="inserted"><ins><em>app 
for a month&lt;/a&gt;.&lt;/p&gt;
+&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;iTunes videos have DRM, which allows</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201805310"&gt;
+    &lt;p&gt;Apple has &lt;a
+    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
+    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple to <span class="inserted"><ins><em>block
     Telegram in Russia.&lt;/p&gt;
 
     &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
-    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    iThings. Since</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its customers can
+  watch the videos</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
     are jails&lt;/a&gt;,</em></ins></span> they <span 
class="removed"><del><strong>purchased&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>don't permit any app to be free 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -709,64 +709,64 @@
   generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;&lt;a
-  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;</strong></del></span>
 <span class="inserted"><ins><em>fixing problems themselves;
-    that's the nature of proprietary software.&lt;/p&gt;
+  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
+  DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
+  focuses on</strong></del></span> <span class="inserted"><ins><em>fixing 
problems themselves;
+    that's</em></ins></span> the <span class="removed"><del><strong>fact that 
a new model</strong></del></span> <span 
class="inserted"><ins><em>nature</em></ins></span> of <span 
class="removed"><del><strong>Macbook introduced a requirement
+  for monitors to have malicious hardware, but DRM software in MacOS is
+  involved in activating the hardware. The software for accessing iTunes
+  is also responsible.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>proprietary software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704070"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains</em></ins></span> DRM <span 
class="removed"><del><strong>(digital restrictions mechanisms) in 
MacOS&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>specifically designed to &lt;a
+    iPhone 7 contains</em></ins></span> DRM <span 
class="removed"><del><strong>that caters</strong></del></span> <span 
class="inserted"><ins><em>specifically designed</em></ins></span> to <span 
class="removed"><del><strong>Bluray disks&lt;/a&gt;.  
(The</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The</em></ins></span> article
-  <span class="removed"><del><strong>focuses on</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>fact that a new model of Macbook introduced a 
requirement
-  for monitors</strong></del></span> <span class="inserted"><ins><em>term 
&ldquo;lock&rdquo;</em></ins></span>
-    to <span class="removed"><del><strong>have malicious 
hardware,</strong></del></span> <span class="inserted"><ins><em>describe the 
DRM,</em></ins></span> but <span class="removed"><del><strong>DRM software in 
MacOS is
-  involved in activating</strong></del></span> <span 
class="inserted"><ins><em>we prefer to use</em></ins></span> the <span 
class="removed"><del><strong>hardware. The software for accessing iTunes
-  is also responsible.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
-    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
-    handcuffs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-  and said that MacOS would do</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
-    &lt;p&gt;Apple &lt;a
-    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-    stops users from fixing</em></ins></span> the <span 
class="removed"><del><strong>same thing subsequently.)&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>focused on Windows
+  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS,</strong></del></span> <span class="inserted"><ins><em>security bugs in 
Quicktime for Windows&lt;/a&gt;,
+iOS,</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>operating system of</strong></del></span> <span 
class="inserted"><ins><em>term &ldquo;lock&rdquo;
+    to describe</em></ins></span> the <span class="removed"><del><strong>Apple 
iThings, is</strong></del></span> <span class="inserted"><ins><em>DRM, but we 
prefer to use</em></ins></span> the <span class="removed"><del><strong>prototype
+of a jail&lt;/a&gt;.  It was</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
+    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
+    handcuffs&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201606080"&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+    stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605040"&gt;
-    &lt;p&gt;The Apple Music client program &lt;a
+    &lt;p&gt;The</em></ins></span> Apple <span 
class="removed"><del><strong>that introduced</strong></del></span> <span 
class="inserted"><ins><em>Music client program &lt;a
     
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
-    the <span class="removed"><del><strong>operating</strong></del></span> 
<span class="inserted"><ins><em>user's file</em></ins></span> system <span 
class="removed"><del><strong>of the</strong></del></span> <span 
class="inserted"><ins><em>for music files, copies them to an</em></ins></span> 
Apple <span class="removed"><del><strong>iThings, is the prototype
-of a jail&lt;/a&gt;.  It was</strong></del></span> <span 
class="inserted"><ins><em>server,
+    the <span class="removed"><del><strong>practice of
+designing general purpose computers with censorship of application
+programs.&lt;/p&gt;
+
+&lt;p&gt;Here is</strong></del></span> <span class="inserted"><ins><em>user's 
file system for music files, copies them to</em></ins></span> an <span 
class="removed"><del><strong>article about the</strong></del></span> <span 
class="inserted"><ins><em>Apple server,
     and deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602050"&gt;
-    &lt;p&gt;iOS version 9 for iThings &lt;a
-    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    &lt;p&gt;iOS version 9 for iThings</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+code signing&lt;/a&gt; that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>that introduced the practice of
-designing general purpose computers with censorship of application
-programs.&lt;/p&gt;
-
-&lt;p&gt;Here is an article about</strong></del></span> <span 
class="inserted"><ins><em>eventually backed off from this policy under
-    criticism from</em></ins></span> the <span 
class="removed"><del><strong>&lt;a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-code signing&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not 
acknowledged</em></ins></span> that <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>this
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from</em></ins></span> the <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -796,7 +796,7 @@
     An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
     unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All</em></ins></span> this <span 
class="removed"><del><strong>freely because</strong></del></span> <span 
class="inserted"><ins><em>was apparently intentional.&lt;/p&gt;
+    censorship&lt;/a&gt;.  All</em></ins></span> this <span 
class="removed"><del><strong>freely because they are 
required</strong></del></span> <span class="inserted"><ins><em>was apparently 
intentional.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -804,22 +804,10 @@
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can &lt;a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when</em></ins></span> they are <span 
class="removed"><del><strong>required</strong></del></span> <span 
class="inserted"><ins><em>suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said</em></ins></span> to 
<span class="removed"><del><strong>identify
-themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this</strong></del></span> <span 
class="inserted"><ins><em>be
-    &ldquo;secure,&rdquo; but it</em></ins></span> is <span 
class="removed"><del><strong>a crack in</strong></del></span> <span 
class="inserted"><ins><em>obviously &lt;em&gt;not&lt;/em&gt; secure from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>identify
+themselves. &lt;a 
href="https://developer.apple.com/xcode/"&gt;Here</strong></del></span>
+    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers 
that</em></ins></span> are <span 
class="removed"><del><strong>details&lt;/a&gt;. While this is a crack 
in</strong></del></span> <span class="inserted"><ins><em>busy at night &lt;a
     
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
@@ -1188,7 +1176,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 08:02:20 $
+$Date: 2019/07/10 13:00:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- po/malware-apple.de.po      27 Jun 2019 08:02:20 -0000      1.132
+++ po/malware-apple.de.po      10 Jul 2019 13:00:22 -0000      1.133
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-27 07:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1089,19 +1089,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/malware-apple.es-en.html 1 Jul 2019 09:29:17 -0000       1.67
+++ po/malware-apple.es-en.html 10 Jul 2019 13:00:23 -0000      1.68
@@ -507,17 +507,6 @@
 <h3 id="surveillance">Apple Surveillance</h3>
 
 <ul class="blurbs">
-  <li id="M201906030">
-    <p>Apple can <a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-    track iMonsters even when they are suspended</a>.</p>
-
-    <p>This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously <em>not</em> secure from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).</p>
-  </li>
-
   <li id="M201905280">
     <p>In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night <a
@@ -783,7 +772,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/07/01 09:29:17 $
+$Date: 2019/07/10 13:00:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- po/malware-apple.es.po      1 Jul 2019 09:03:50 -0000       1.141
+++ po/malware-apple.es.po      10 Jul 2019 13:00:23 -0000      1.142
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-27 07:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -908,25 +908,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple puede <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
-"my-app/\">rastrear los iMonsturos incluso cuando se encuentran en modo "
-"<em>suspendido</em></a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Se dice que esta red de bluetooth distribuida es «segura», pero obviamente "
-"<em>no</em> lo es frente a Apple o los Gobiernos que puedan exigir "
-"obediencia a Apple (como EE.UU. o China)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
@@ -1371,6 +1352,23 @@
 msgid "Updated:"
 msgstr "Última actualización:"
 
+#~ msgid ""
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple puede <a href=\"https://www.macrumors.com/2019/06/03/apples-new-";
+#~ "find-my-app/\">rastrear los iMonsturos incluso cuando se encuentran en "
+#~ "modo <em>suspendido</em></a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Se dice que esta red de bluetooth distribuida es «segura», pero "
+#~ "obviamente <em>no</em> lo es frente a Apple o los Gobiernos que puedan "
+#~ "exigir obediencia a Apple (como EE.UU. o China)."
+
 #~ msgid "<a href=\"#interference\">Interference</a>"
 #~ msgstr "<a href=\"#interference\">Interferencia</a>"
 

Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/malware-apple.fr-en.html 27 Jun 2019 09:29:34 -0000      1.75
+++ po/malware-apple.fr-en.html 10 Jul 2019 13:00:23 -0000      1.76
@@ -507,17 +507,6 @@
 <h3 id="surveillance">Apple Surveillance</h3>
 
 <ul class="blurbs">
-  <li id="M201906030">
-    <p>Apple can <a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-    track iMonsters even when they are suspended</a>.</p>
-
-    <p>This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously <em>not</em> secure from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).</p>
-  </li>
-
   <li id="M201905280">
     <p>In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night <a
@@ -783,7 +772,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/27 09:29:34 $
+$Date: 2019/07/10 13:00:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- po/malware-apple.fr.po      27 Jun 2019 09:14:41 -0000      1.148
+++ po/malware-apple.fr.po      10 Jul 2019 13:00:23 -0000      1.149
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-27 07:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2019-06-27 11:13+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -910,25 +910,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple peut <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\">pister les iMonstres même lorsqu'ils sont en mode <cite>suspend</"
-"cite></a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Ce réseau Bluetooth distribué a la réputation d'être « sécurisé », 
mais à "
-"l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des États 
qui "
-"peuvent forcer Apple à leur obéir (comme les États-Unis ou la Chine)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
@@ -1371,3 +1352,20 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple peut <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\">pister les iMonstres même lorsqu'ils sont en mode "
+#~ "<cite>suspend</cite></a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Ce réseau Bluetooth distribué a la réputation d'être « sécurisé 
», mais à "
+#~ "l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des 
États "
+#~ "qui peuvent forcer Apple à leur obéir (comme les États-Unis ou la 
Chine)."

Index: po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- po/malware-apple.it-diff.html       27 Jun 2019 08:02:21 -0000      1.45
+++ po/malware-apple.it-diff.html       10 Jul 2019 13:00:23 -0000      1.46
@@ -438,7 +438,7 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted</em></ins></span> it was censoring the app based on the subject 
<span class="removed"><del><strong>matter&lt;/a&gt;.
+    admitted</em></ins></span> it was censoring the app based on <span 
class="removed"><del><strong>the subject matter&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
@@ -470,24 +470,28 @@
     &lt;p&gt;A bug in the iThings Messages
       app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
         a malicious web site to extract all the user's messaging 
history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings</strong></del></span> 
<span class="inserted"><ins><em>the subject matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Apple Manipulation&lt;/h3&gt;
+&lt;h3 id="manipulation"&gt;Apple Manipulation&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo;</em></ins></span> are <span 
class="removed"><del><strong>not grave enough</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed</em></ins></span> to <span 
class="removed"><del><strong>qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings</strong></del></span> 
<span class="inserted"><ins><em>mislead users, or make option settings 
hard</em></ins></span>
+    interfaces designed to mislead users, or make option settings 
hard</em></ins></span>
     to <span class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This allows</em></ins></span> a <span 
class="removed"><del><strong>system upgrade
@@ -614,8 +618,7 @@
     
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
     Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from the users. However, it has not acknowledged that
-    <span class="removed"><del><strong>this was 
wrong.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>this
+    criticism from the <span class="removed"><del><strong>users. However, it 
has not acknowledged</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -630,7 +633,8 @@
   &lt;li id="M201412040"&gt;
     &lt;p&gt;Apple &lt;a
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods the music that users had got from internet music
+    deleted from iPods the music</em></ins></span> that
+    <span class="removed"><del><strong>this was 
wrong.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
had got from internet music
     stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -646,49 +650,37 @@
     censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple
+  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods the music that users had got from internet music
+  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
+&lt;/ul&gt;
 
 
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span 
class="removed"><del><strong>iPods</strong></del></span>
-    <span class="inserted"><ins><em>Apple or from governments that can command 
Apple's obedience (such
-    as</em></ins></span> the <span 
class="removed"><del><strong>music</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;
-  &lt;/li&gt;
-
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>users had got from internet music
-  stores</strong></del></span> <span class="inserted"><ins><em>are busy at 
night &lt;a
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
     
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>most nonfree apps contain
+    and DoorDash. But it is likely that most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
     delivery address (in the case of DoorDash). Once this information
     is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;</em></ins></span>
+    used for.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201809070"&gt;
+  &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
@@ -1059,7 +1051,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 08:02:21 $
+$Date: 2019/07/10 13:00:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- po/malware-apple.it.po      27 Jun 2019 08:02:21 -0000      1.126
+++ po/malware-apple.it.po      10 Jul 2019 13:00:23 -0000      1.127
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-27 07:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1117,19 +1117,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- po/malware-apple.ja-diff.html       27 Jun 2019 08:02:21 -0000      1.58
+++ po/malware-apple.ja-diff.html       10 Jul 2019 13:00:23 -0000      1.59
@@ -322,12 +322,12 @@
 href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
 code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
 
-&lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+&lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>allow limited passage through the
 walls of the iThing jail: users can now install apps built from
 source code, provided the source code is written in Swift.  Users
 cannot do this freely because they are required to identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
+are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="inserted"><ins><em>crack in the prison walls, it is not
 big enough to mean that the iThings are no longer jails.&lt;/p&gt;
 
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
@@ -362,9 +362,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
-    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
-    by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple used its censorship</em></ins></span> system <span 
class="removed"><del><strong>upgrade</strong></del></span> <span 
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
     While subjecting its users to its own surveillance, it tries to
@@ -458,11 +458,9 @@
     interfaces designed to mislead users, or make option settings hard
     to find&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand 
how</em></ins></span>
-    to <span class="removed"><del><strong>download a system upgrade
-         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;. 
-         Apple did not forcibly install the upgrade but the downloading alone 
caused lots of trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>actually turn it off.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This allows a company such as</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install the upgrade but the 
downloading alone caused lots of trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -572,8 +570,9 @@
     &lt;p&gt;iOS version 9 for iThings &lt;a
     
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from the <span class="removed"><del><strong>users. However, it 
has not acknowledged</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
+    Apple&lt;/a&gt;. Apple <span class="removed"><del><strong>eventually 
backed off from this policy under
+    criticism</strong></del></span> <span class="inserted"><ins><em>eventually 
backed off from this policy under
+    criticism from the users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -588,7 +587,7 @@
   &lt;li id="M201412040"&gt;
     &lt;p&gt;Apple &lt;a
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods the music</em></ins></span> that
+    deleted</em></ins></span> from <span 
class="inserted"><ins><em>iPods</em></ins></span> the <span 
class="removed"><del><strong>users. However, it has not 
acknowledged</strong></del></span> <span 
class="inserted"><ins><em>music</em></ins></span> that
     <span class="removed"><del><strong>this was 
wrong.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
had got from internet music
     stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -605,49 +604,37 @@
     censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple
+  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods the music that users had got from internet music
+  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
+&lt;/ul&gt;
 
 
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span 
class="removed"><del><strong>iPods</strong></del></span>
-    <span class="inserted"><ins><em>Apple or from governments that can command 
Apple's obedience (such
-    as</em></ins></span> the <span 
class="removed"><del><strong>music</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;
-  &lt;/li&gt;
-
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>users had got from internet music
-  stores</strong></del></span> <span class="inserted"><ins><em>are busy at 
night &lt;a
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
     
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>most nonfree apps contain
+    and DoorDash. But it is likely that most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
     delivery address (in the case of DoorDash). Once this information
     is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;</em></ins></span>
+    used for.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201809070"&gt;
+  &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
@@ -1010,7 +997,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 08:02:21 $
+$Date: 2019/07/10 13:00:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- po/malware-apple.ja.po      27 Jun 2019 08:02:21 -0000      1.109
+++ po/malware-apple.ja.po      10 Jul 2019 13:00:23 -0000      1.110
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-27 07:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -814,19 +814,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- po/malware-apple.nl-diff.html       27 Jun 2019 08:02:21 -0000      1.62
+++ po/malware-apple.nl-diff.html       10 Jul 2019 13:00:23 -0000      1.63
@@ -322,12 +322,12 @@
 href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
 code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
 
-&lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+&lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>allow limited passage through the
 walls of the iThing jail: users can now install apps built from
 source code, provided the source code is written in Swift.  Users
 cannot do this freely because they are required to identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
+are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="inserted"><ins><em>crack in the prison walls, it is not
 big enough to mean that the iThings are no longer jails.&lt;/p&gt;
 
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
@@ -362,9 +362,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
-    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
-    by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple used its censorship</em></ins></span> system <span 
class="removed"><del><strong>upgrade</strong></del></span> <span 
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
     While subjecting its users to its own surveillance, it tries to
@@ -458,11 +458,9 @@
     interfaces designed to mislead users, or make option settings hard
     to find&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand 
how</em></ins></span>
-    to <span class="removed"><del><strong>download a system upgrade
-         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;. 
-         Apple did not forcibly install the upgrade but the downloading alone 
caused lots of trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>actually turn it off.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This allows a company such as</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install the upgrade but the 
downloading alone caused lots of trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -572,8 +570,9 @@
     &lt;p&gt;iOS version 9 for iThings &lt;a
     
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from the <span class="removed"><del><strong>users. However, it 
has not acknowledged</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
+    Apple&lt;/a&gt;. Apple <span class="removed"><del><strong>eventually 
backed off from this policy under
+    criticism</strong></del></span> <span class="inserted"><ins><em>eventually 
backed off from this policy under
+    criticism from the users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -588,7 +587,7 @@
   &lt;li id="M201412040"&gt;
     &lt;p&gt;Apple &lt;a
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods the music</em></ins></span> that
+    deleted</em></ins></span> from <span 
class="inserted"><ins><em>iPods</em></ins></span> the <span 
class="removed"><del><strong>users. However, it has not 
acknowledged</strong></del></span> <span 
class="inserted"><ins><em>music</em></ins></span> that
     <span class="removed"><del><strong>this was 
wrong.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
had got from internet music
     stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -605,49 +604,37 @@
     censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple
+  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods the music that users had got from internet music
+  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
+&lt;/ul&gt;
 
 
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span 
class="removed"><del><strong>iPods</strong></del></span>
-    <span class="inserted"><ins><em>Apple or from governments that can command 
Apple's obedience (such
-    as</em></ins></span> the <span 
class="removed"><del><strong>music</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;
-  &lt;/li&gt;
-
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>users had got from internet music
-  stores</strong></del></span> <span class="inserted"><ins><em>are busy at 
night &lt;a
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
     
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely</em></ins></span> that <span 
class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>most nonfree apps contain
+    and DoorDash. But it is likely that most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
     delivery address (in the case of DoorDash). Once this information
     is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;</em></ins></span>
+    used for.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201809070"&gt;
+  &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
@@ -1010,7 +997,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 08:02:21 $
+$Date: 2019/07/10 13:00:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- po/malware-apple.nl.po      27 Jun 2019 08:02:21 -0000      1.62
+++ po/malware-apple.nl.po      10 Jul 2019 13:00:23 -0000      1.63
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-27 07:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -922,19 +922,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/malware-apple.pot        27 Jun 2019 07:25:46 -0000      1.74
+++ po/malware-apple.pot        10 Jul 2019 13:00:23 -0000      1.75
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-27 07:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -636,20 +636,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a "
-"href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\";> track "
-"iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a "
 
"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\";>
 "

Index: po/malware-apple.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru-en.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/malware-apple.ru-en.html 27 Jun 2019 09:29:34 -0000      1.75
+++ po/malware-apple.ru-en.html 10 Jul 2019 13:00:23 -0000      1.76
@@ -507,17 +507,6 @@
 <h3 id="surveillance">Apple Surveillance</h3>
 
 <ul class="blurbs">
-  <li id="M201906030">
-    <p>Apple can <a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-    track iMonsters even when they are suspended</a>.</p>
-
-    <p>This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously <em>not</em> secure from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).</p>
-  </li>
-
   <li id="M201905280">
     <p>In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night <a
@@ -783,7 +772,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/27 09:29:34 $
+$Date: 2019/07/10 13:00:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- po/malware-apple.ru.po      27 Jun 2019 09:29:34 -0000      1.203
+++ po/malware-apple.ru.po      10 Jul 2019 13:00:23 -0000      1.204
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-27 07:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2019-01-29 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -901,24 +901,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple может <a 
href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
-"my-app/\"> отслежвать ай-чудищ, даже когда они 
в спящем режиме</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Говорят, что эта распределенная сеть Bluetooth 
&ldquo;защищена&rdquo;, но "
-"она с очевидностью <em>не</em> защищена от Apple 
или правящих режимов, "
-"которые могут подчинить себе Apple (таких 
как США и Китай)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
@@ -1359,5 +1341,21 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
+#~ msgid ""
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple может <a 
href=\"https://www.macrumors.com/2019/06/03/apples-new-";
+#~ "find-my-app/\"> отслежвать ай-чудищ, даже когда 
они в спящем режиме</a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Говорят, что эта распределенная сеть 
Bluetooth &ldquo;защищена&rdquo;, но "
+#~ "она с очевидностью <em>не</em> защищена от 
Apple или правящих режимов, "
+#~ "которые могут подчинить себе Apple (таких 
как США и Китай)."
+
 #~ msgid "<a href=\"#interference\">Interference</a>"
 #~ msgstr "<a href=\"#interference\">Помехи</a>"

Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- po/nl.po    30 Jun 2019 08:29:21 -0000      1.104
+++ po/nl.po    10 Jul 2019 13:00:23 -0000      1.105
@@ -1414,19 +1414,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- po/pl.po    30 Jun 2019 08:29:21 -0000      1.104
+++ po/pl.po    10 Jul 2019 13:00:23 -0000      1.105
@@ -1151,19 +1151,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- po/pot      30 Jun 2019 08:29:21 -0000      1.103
+++ po/pot      10 Jul 2019 13:00:23 -0000      1.104
@@ -1013,19 +1013,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- po/proprietary-surveillance.de-diff.html    27 Jun 2019 14:00:28 -0000      
1.82
+++ po/proprietary-surveillance.de-diff.html    10 Jul 2019 13:00:23 -0000      
1.83
@@ -647,17 +647,7 @@
       <span class="removed"><del><strong>users' text messages.&lt;/dd&gt;
 
     &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps and also core system logs. TigerVPN 
developers</strong></del></span> have <span 
class="removed"><del><strong>confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
-      and may turn them over to the UK government if
-      requested.&lt;/dd&gt;
-
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection</strong></del></span> 
<span class="inserted"><ins><em>GPS.)&lt;/p&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -668,95 +658,99 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can &lt;a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network</em></ins></span> is <span 
class="inserted"><ins><em>said</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>be
-    &ldquo;secure,&rdquo; but</em></ins></span> it <span 
class="removed"><del><strong>redirects the
-      user's traffic through valueclick.com (an advertising
-      website).&lt;/dd&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>read logs
+      for other</strong></del></span>
+    <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps 
<span class="removed"><del><strong>and also core system logs. TigerVPN 
developers
+      have confirmed this.&lt;/dd&gt;
 
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
-      roughly 5 tracking libraries. Developers of this app have
-      confirmed</strong></del></span> <span class="inserted"><ins><em>is 
obviously &lt;em&gt;not&lt;/em&gt; secure from
-    Apple or from governments</em></ins></span> that <span 
class="inserted"><ins><em>can command Apple's obedience (such
-    as</em></ins></span> the <span class="removed"><del><strong>non-premium 
version of the app does
-      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>US</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span 
class="inserted"><ins><em>China).&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>the top-ranked gratis
-  proprietary Android</strong></del></span> <span 
class="inserted"><ins><em>Apple's supposed commitment to
-    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>contain trackers that are busy at night &lt;a
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>contain trackers that are busy at night &lt;a
     
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
-    sending users' personal information to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>LinkedIn. Also, it stores detailed 
logs</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article <span class="removed"><del><strong>confusingly 
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions 
specific examples: Microsoft OneDrive,
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree</em></ins></span> apps 
<span class="inserted"><ins><em>contain
-    trackers. Some of these send personally identifying data 
such</em></ins></span> as <span class="removed"><del><strong>&ldquo;free&rdquo;,
-  but most</strong></del></span> <span class="inserted"><ins><em>phone
+    Channel (owned by IBM), the crime-alert service Citizen, 
Yelp</em></ins></span>
+    and <span class="removed"><del><strong>may turn them over to the UK 
government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages returned 
to</strong></del></span> <span class="inserted"><ins><em>DoorDash. But it is 
likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
-    is collected by</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>company, 
there</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that</strong></del></span> <span class="inserted"><ins><em>no telling what 
it</em></ins></span> will <span class="removed"><del><strong>fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
-    used for.&lt;/p&gt;</em></ins></span>
+    delivery address (in</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span 
class="inserted"><ins><em>case</em></ins></span> of <span 
class="inserted"><ins><em>DoorDash). Once this information
+    is collected by</em></ins></span> the <span 
class="removed"><del><strong>JS injection</strong></del></span> <span 
class="inserted"><ins><em>company, there</em></ins></span> is <span 
class="removed"><del><strong>to display
+      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>no telling what</em></ins></span> it <span 
class="removed"><del><strong>redirects the
+      user's traffic through valueclick.com (an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>will be
+    used for.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>also uses
+      roughly 5 tracking libraries. Developers of</strong></del></span> <span 
class="inserted"><ins><em>the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because</em></ins></span>
+    this <span class="removed"><del><strong>app have
+      confirmed that</strong></del></span> <span 
class="inserted"><ins><em>would require circumventing</em></ins></span> the 
<span class="removed"><del><strong>non-premium version of</strong></del></span> 
<span class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201709210"&gt;
+    &lt;p&gt;In</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced way 
really</em></ins></span> does
+      <span class="removed"><del><strong>JavaScript 
injection</strong></del></span> <span class="inserted"><ins><em>turn
+    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span 
class="inserted"><ins><em>you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
+    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+  It also uses</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
+  for that word</strong></del></span> <span 
class="inserted"><ins><em>phone</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apps for BART
+    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
 <span class="inserted"><ins><em>snooping</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
   &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
+  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
   &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be 
spied on&rdquo;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201611170"&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
-    &lt;p&gt;Apple proposes &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
-    to <span class="removed"><del><strong>transmit users' personal
-       data</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
-    no way</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>tell whether the phone is snooping on them.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;/li&gt;
 
-  &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span>
+&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    lots</em></ins></span> of <span class="removed"><del><strong>Android apps 
can collude to transmit users'</strong></del></span> personal data to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -778,13 +772,13 @@
     &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
 stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's 
servers all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
     and <span class="removed"><del><strong>Conditions&rdquo; that spell out
-what</strong></del></span> <span 
class="inserted"><ins><em>videos</em></ins></span> they <span 
class="removed"><del><strong>are &ldquo;consenting&rdquo; to.  Google should 
clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
+what</strong></del></span> <span 
class="inserted"><ins><em>videos</em></ins></span> they <span 
class="removed"><del><strong>are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>make.&lt;/p&gt;
 
-&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>make.&lt;/p&gt;
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span class="removed"><del><strong>honestly 
identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span class="removed"><del><strong>other companies 
from getting this personal information in the first
+&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal information in the first
 place!&lt;/p&gt;
 &lt;/li&gt;
 
@@ -912,21 +906,23 @@
 
 
 <span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on 
Mobiles&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInAndroid"&gt;Android 
Telephones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android 
Telephones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
+&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
@@ -1743,8 +1739,8 @@
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
       Several &ldquo;features&rdquo; of iOS seem</strong></del></span> to 
<span class="removed"><del><strong>exist for no
-      possible purpose</strong></del></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>companies.  This 
shows</em></ins></span> the <span class="inserted"><ins><em>weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+      possible purpose</strong></del></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>companies.  This shows 
the weakness of</em></ins></span>
+    the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
@@ -3504,7 +3500,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 14:00:28 $
+$Date: 2019/07/10 13:00:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -b -r1.297 -r1.298
--- po/proprietary-surveillance.de.po   27 Jun 2019 09:29:35 -0000      1.297
+++ po/proprietary-surveillance.de.po   10 Jul 2019 13:00:23 -0000      1.298
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-27 09:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1237,19 +1237,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- po/proprietary-surveillance.fr-en.html      27 Jun 2019 14:00:28 -0000      
1.176
+++ po/proprietary-surveillance.fr-en.html      10 Jul 2019 13:00:23 -0000      
1.177
@@ -494,17 +494,6 @@
 </div>
 
 <ul class="blurbs">
-  <li id="M201906030">
-    <p>Apple can <a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-    track iMonsters even when they are suspended</a>.</p>
-
-    <p>This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously <em>not</em> secure from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).</p>
-  </li>
-
   <li id="M201905280">
     <p>In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night <a
@@ -2433,7 +2422,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/27 14:00:28 $
+$Date: 2019/07/10 13:00:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.448
retrieving revision 1.449
diff -u -b -r1.448 -r1.449
--- po/proprietary-surveillance.fr.po   27 Jun 2019 10:32:11 -0000      1.448
+++ po/proprietary-surveillance.fr.po   10 Jul 2019 13:00:23 -0000      1.449
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-27 09:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2019-06-27 12:31+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -902,25 +902,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple peut <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\">pister les iMonstres même lorsqu'ils sont en mode <cite>suspend</"
-"cite></a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Ce réseau Bluetooth distribué a la réputation d'être « sécurisé », 
mais à "
-"l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des États 
qui "
-"peuvent forcer Apple à leur obéir (comme les États-Unis ou la Chine)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
@@ -4539,3 +4520,20 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple peut <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\">pister les iMonstres même lorsqu'ils sont en mode "
+#~ "<cite>suspend</cite></a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Ce réseau Bluetooth distribué a la réputation d'être « sécurisé 
», mais à "
+#~ "l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des 
États "
+#~ "qui peuvent forcer Apple à leur obéir (comme les États-Unis ou la 
Chine)."

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- po/proprietary-surveillance.it-diff.html    27 Jun 2019 14:00:28 -0000      
1.149
+++ po/proprietary-surveillance.it-diff.html    10 Jul 2019 13:00:23 -0000      
1.150
@@ -634,9 +634,13 @@
     disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
     yet another example of nonfree software pretending</strong></del></span>
     <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones</em></ins></span>
-    to <span class="removed"><del><strong>obey the user,</strong></del></span> 
<span class="inserted"><ins><em>have GPS.)&lt;/p&gt;
+    to <span class="removed"><del><strong>obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -645,47 +649,31 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can &lt;a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even</em></ins></span> when <span 
class="removed"><del><strong>it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>they are 
suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said to</em></ins></span> 
be <span class="removed"><del><strong>almost
-    unthinkable with free software.&lt;/p&gt;
-
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;More than 73% of</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;secure,&rdquo; but it is obviously 
&lt;em&gt;not&lt;/em&gt; secure from
-    Apple or from governments that can command Apple's obedience (such
-    as</em></ins></span> the <span class="removed"><del><strong>most popular 
Android apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span 
class="inserted"><ins><em>US</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China).&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>the most popular Android</strong></del></span> 
<span class="inserted"><ins><em>Apple's supposed commitment to
+    privacy, iPhone</em></ins></span> apps <span 
class="inserted"><ins><em>contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>the app's functionality,
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
+    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>the app's functionality,
   was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+  found in the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-  &lt;p&gt;The article should not have described these</strong></del></span>
-    <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps 
<span class="removed"><del><strong>as
-  &ldquo;free&rdquo;&mdash;they</strong></del></span> <span 
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span 
class="removed"><del><strong>not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>busy at night &lt;a
-    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
-    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>say
-  &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The article <span class="removed"><del><strong>takes for granted 
that</strong></del></span> <span class="inserted"><ins><em>mentions specific 
examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM),</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
-    and DoorDash. But it</em></ins></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers 
have</strong></del></span> <span class="inserted"><ins><em>most nonfree apps 
contain
+    &lt;p&gt;The article <span class="removed"><del><strong>should not have 
described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify,</em></ins></span> The <span 
class="removed"><del><strong>clear way to say
+  &ldquo;zero price&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes for granted</strong></del></span> <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="inserted"><ins><em>most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is</em></ins></span> no <span 
class="removed"><del><strong>right to
+    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but</strong></del></span> <span class="inserted"><ins><em>case 
of DoorDash). Once this information
+    is collected by the company, there</em></ins></span> is <span 
class="removed"><del><strong>that valid?  Software developers 
have</strong></del></span> no <span class="removed"><del><strong>right to
   analyze</strong></del></span> <span 
class="inserted"><ins><em>telling</em></ins></span> what <span 
class="removed"><del><strong>users are doing or how.  &ldquo;Analytics&rdquo; 
tools that snoop are
   just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it will be
     used for.&lt;/p&gt;</em></ins></span>
@@ -701,16 +689,16 @@
     this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola phones modify Android to
-      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span>
+      Some Motorola phones modify Android to</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -874,12 +862,12 @@
       turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
     to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
@@ -910,58 +898,61 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen to</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
+      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location</strong></del></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data <span 
class="inserted"><ins><em>to Google.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Nonfree software in</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>phone has to be responsible for 
sending</em></ins></span>
-    the <span class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+  &lt;li id="M201812060"&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
+    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
+    what</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't</em></ins></span> send <span 
class="removed"><del><strong>so much</strong></del></span> <span 
class="inserted"><ins><em>the location</em></ins></span> data <span 
class="removed"><del><strong>that their transmission is a
-      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>while in
+    &lt;p&gt;An Android phone was observed to track</em></ins></span> location 
<span class="inserted"><ins><em>even while
+    in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
-      requested by</strong></del></span> <span 
class="inserted"><ins><em>Google &lt;a
+    &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
     even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
-    the <span class="removed"><del><strong>user, clearly must constitute 
spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> phone <span 
class="inserted"><ins><em>has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>contact list. This malware is 
designed to
+      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable</em></ins></span> phones <span 
class="removed"><del><strong>come with</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they send so much</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>that their transmission is a
+      substantial expense for users.  Said transmission, not wanted or
+      requested by the user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>to 
China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google Play (a component</em></ins></span> of <span 
class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>Android)</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if you disable Google Maps and location tracking, you must
     disable Google Play itself to completely stop the tracking.  This is
@@ -974,19 +965,17 @@
     &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
     that users can't delete&lt;/a&gt;, and they send so much data that their
-    transmission is a substantial expense</em></ins></span> for <span 
class="removed"><del><strong>voice all</strong></del></span> <span 
class="inserted"><ins><em>users.  Said transmission,
-    not wanted or requested by</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user, clearly must constitute spying
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
     of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</em></ins></span>
+    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
+  &lt;li id="M201308010"&gt;
     &lt;p&gt;Spyware</em></ins></span> in Android phones (and Windows? 
laptops): The Wall Street
     Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
@@ -1007,47 +996,46 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
     &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
-      the use of data on the user's computer, but it does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;
+      the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>present</em></ins></span> in <span 
class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, 
judging</strong></del></span> <span class="inserted"><ins><em>some Android 
devices when they are
-    sold.  Some Motorola phones, made when this company was 
owned</em></ins></span>
-    by <span class="inserted"><ins><em>Google, use a modified version of 
Android that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends</em></ins></span> personal data <span 
class="removed"><del><strong>in the device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal data 
in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>that it will&lt;/a&gt;
         pre-install on some of its phones. The app will give Verizon the same
    information about the users' searches that Google normally gets when
    they use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all</em></ins></span> the <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+   &lt;p&gt;Currently, the app is</strong></del></span> <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
     the
@@ -1076,9 +1064,9 @@
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+        movements before and after</strong></del></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
         for surveillance is inadequate as a protection against massive
         surveillance.&lt;/p&gt;
   &lt;/li&gt;
@@ -1098,10 +1086,7 @@
       are playing nearby&lt;/a&gt;.  Also on what users post on various 
sites</strong></del></span> <span 
class="inserted"><ins><em>package</em></ins></span> such as <span 
class="removed"><del><strong>Facebook, Google+ and 
Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Carrier IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app
-      &lt;a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1112,9 +1097,12 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the picture you take 
according to who
-      is in</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share the picture you take according to who
+      is in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
     sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1176,17 +1164,14 @@
       twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a way
       to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
       whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
-    is <span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
+    is <span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
-    apps</strong></del></span> the <span class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary 
apps</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1195,15 +1180,19 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> <span 
class="inserted"><ins><em>secretly</em></ins></span> a <span 
class="removed"><del><strong>way that at least is visible and
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
+    apps the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and
     optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
-    for contraception.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust</em></ins></span>
+    for <span class="removed"><del><strong>children don't respect privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;</em></ins></span>
@@ -1332,11 +1321,11 @@
        people used it&lt;/a&gt;.&lt;/p&gt;
     
     &lt;p&gt;The company's statement that it was anonymizing 
the</strong></del></span> data <span class="removed"><del><strong>may be
-      true, but</strong></del></span> <span class="inserted"><ins><em>to third 
parties&lt;/a&gt;, which can use</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
+      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>to third parties&lt;/a&gt;, which can 
use</em></ins></span> it <span class="removed"><del><strong>had sold the 
data</strong></del></span>
     <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>had sold the data</strong></del></span> 
<span class="inserted"><ins><em>is buried in
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
     lengthy terms of service that are difficult to understand. In any case,
     &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
@@ -1368,40 +1357,44 @@
     78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the
        <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected</strong></del></span> <span class="inserted"><ins><em>total) 
link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by <span 
class="inserted"><ins><em>resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
-    that the policies of a development platform are ineffective at
+    and, once informed, was in no hurry to take action. This proves
+    that</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>policies of a development platform are ineffective at
     preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+  &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen</strong></del></span> <span class="inserted"><ins><em>app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>redirecting
+    them</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1416,13 +1409,10 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users, and 
redirecting
-    them to phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note</strong></del></span> <span class="inserted"><ins><em>phishing 
sites</em></ins></span> that <span class="inserted"><ins><em>stole their 
credentials. Furthermore,</em></ins></span>
     the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
 GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
@@ -1447,7 +1437,12 @@
 &lt;!-- #SpywareAtWork --&gt;
 &lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1457,158 +1452,54 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>users. 
Other technical flaws were
-    found as well.&lt;/p&gt;
+        Shows</strong></del></span> <span class="inserted"><ins><em>10 gratis 
VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect the emails</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>members of Parliament
-  this way, because</strong></del></span>
-    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but</em></ins></span> they <span 
class="removed"><del><strong>pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>are &lt;em&gt;not&lt;/em&gt;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;.</em></ins></span> The 
<span class="removed"><del><strong>Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>company</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding that it 
notify</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>will do
-    with</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>using it to outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>about a side issue. 
What</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>user reads 
at what time&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Specifically,</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>data is 
a secondary issue. The principal wrong here is that</em></ins></span>
-    the <span class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of</strong></del></span> <span 
class="inserted"><ins><em>company gets that</em></ins></span> data <span 
class="removed"><del><strong>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed to check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>at all.&lt;/p&gt;
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>what it will do
+    with the data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and 
WeatherBug,</em></ins></span> are
-  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>tracking people's 
locations.&lt;/p&gt;</em></ins></span> 
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span class="removed"><del><strong>system 
has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>Nissan has no
-    access.  The software in</strong></del></span>
-    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the <span class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith</strong></del></span> <span 
class="inserted"><ins><em>obtains</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables</strong></del></span> the <span 
class="removed"><del><strong>phone company to track</strong></del></span> <span 
class="inserted"><ins><em>same machine via
-    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>user's activities 
in</em></ins></span> the <span class="removed"><del><strong>time; 
it</strong></del></span> <span class="inserted"><ins><em>app; others only say 
that the user</em></ins></span> is <span class="removed"><del><strong>possible 
to physically remove</strong></del></span>
-    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
-
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These 
systems</strong></del></span> <span class="inserted"><ins><em>users that have 
deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span> <span 
class="inserted"><ins><em>send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
@@ -1617,93 +1508,42 @@
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There</em></ins></span> are <span class="removed"><del><strong>an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. 
The</strong></del></span> other
-      <span class="removed"><del><strong>cases mentioned are 
done</strong></del></span> <span class="inserted"><ins><em>kinds of location
-    tracking, but most users will be tricked</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>user's 
movements</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company 
says</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But I can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to snoop</em></ins></span>
-    and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40% of</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> were <span 
class="removed"><del><strong>programmed</strong></del></span>
-    <span class="inserted"><ins><em>found</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke:</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
-    source code they cannot look at.</em></ins></span>  The other <span 
class="removed"><del><strong>day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping
-    in</em></ins></span> other <span class="removed"><del><strong>way.&rdquo; 
Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that</strong></del></span> <span 
class="inserted"><ins><em>ways.&lt;/p&gt;
-
-    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>viewed on them,</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>cable&lt;/a&gt;. Even 
if</strong></del></span> the <span class="removed"><del><strong>image is 
coming</strong></del></span> <span class="inserted"><ins><em>proprietary apps 
by getting apps</em></ins></span> from the <span 
class="removed"><del><strong>user's own
-    computer, the TV reports what it is. The existence of a way to
-    disable</strong></del></span> <span class="inserted"><ins><em>free software
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>surveillance, 
even</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> if <span 
class="removed"><del><strong>it were</strong></del></span> <span 
class="inserted"><ins><em>an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
@@ -1712,20 +1552,13 @@
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should</em></ins></span> not <span 
class="removed"><del><strong>hidden as it was in
-    these TVs, does</strong></del></span> <span class="inserted"><ins><em>have 
so much information about its users.
+    &lt;p&gt;Grindr should not have so much information about its users.
     It could be designed so that users communicate such info to each
-    other but</em></ins></span> not <span 
class="removed"><del><strong>legitimize</strong></del></span> <span 
class="inserted"><ins><em>to</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>server's database.&lt;/p&gt;</em></ins></span>
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>report was as of 2014, but 
we don't expect this has got better.&lt;/p&gt;
-
-    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>moviepass app and dis-service
+  &lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass app and dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
@@ -1745,9 +1578,9 @@
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>this article misuses the words
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>zero price.&lt;/p&gt;
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
@@ -2342,11 +2175,14 @@
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2354,20 +2190,25 @@
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
     Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
     send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
@@ -2381,16 +2222,38 @@
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
     give the manufacturer an unencrypted copy of everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
     manufacturers promise not to look at what's in the videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
+    security</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>your home. Security means making</em></ins></span> 
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
@@ -2399,28 +2262,67 @@
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511250"&gt;
+  &lt;li id="M201511250"&gt;</em></ins></span>
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+    even when the &ldquo;owner&rdquo; switches <span 
class="removed"><del><strong>it &ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>it 
&ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>outsmart 
you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
+    listening device, remote</em></ins></span> changes <span 
class="removed"><del><strong>in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed</strong></del></span> <span class="inserted"><ins><em>code could 
surely convert it
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2433,74 +2335,119 @@
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on its users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>was 
surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which users could have checked
+    products, rather than free</em></ins></span> software <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>phone</strong></del></span> company 
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
+    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
+    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> the <span 
class="removed"><del><strong>company to extract data remotely and
+      determine</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>store it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about</strong></del></span> <span class="inserted"><ins><em>a 
child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201502180"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips 
made</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>joke: The</strong></del></span> <span 
class="inserted"><ins><em>DJI drone
+    to snoop on</em></ins></span> other <span 
class="removed"><del><strong>day</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is in many cases &lt;a
     
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2513,48 +2460,51 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
     than is necessary for correct functioning (time, location,
     recordings made without a legitimate prompt), and sends
-    it to Amazon's servers, which store it indefinitely. Even
+    it</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
     even if users request deletion of their data from Amazon's servers, &lt;a
     
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
     the data remain on other servers&lt;/a&gt;, where they can be accessed by
-    advertising companies and government agencies. In other words,
+    advertising companies</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see 
you</strong></del></span> <span class="inserted"><ins><em>government agencies. 
In other words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary on the servers
+    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>servers
     the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture of users' life
+    Alexa. As a result,</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>has a very precise picture of users' life
     at home, not only in the present, but in the past (and, who knows,
     in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of</em></ins></span> users' <span 
class="removed"><del><strong>formal
-      consent before collecting</strong></del></span> <span 
class="inserted"><ins><em>commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
     recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
     &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other</em></ins></span> personal <span 
class="inserted"><ins><em>data&lt;/a&gt;.&lt;/p&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and</em></ins></span> data 
<span class="removed"><del><strong>are totally inadequate.
-      And</strong></del></span> <span class="inserted"><ins><em>processing is 
done
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know</em></ins></span> what happens <span 
class="removed"><del><strong>if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent</strong></del></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
+    to know what happens to the recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
     break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2562,44 +2512,62 @@
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the user <span 
class="removed"><del><strong>watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further</strong></del></span> <span 
class="inserted"><ins><em>is still
-    paying for the subscription, and hasn't printed more 
pages</em></ins></span> than <span class="removed"><del><strong>other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
+    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>constantly
+    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for</em></ins></span> the <span class="removed"><del><strong>user's 
own
+    computer,</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be 
cheaper</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>some
-    specific cases, it spies</em></ins></span> on 
-      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>users, and 
involves totally unacceptable
-    restrictions</em></ins></span> in <span 
class="removed"><del><strong>detail</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>TV reports what</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
+    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>is. The existence</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+    restrictions in the use</em></ins></span> of <span 
class="inserted"><ins><em>ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon 
device,</em></ins></span>
-    and 
-      <span class="removed"><del><strong>link</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a way to
+    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as it was in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon 
device,
+    and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for</em></ins></span> them <span 
class="removed"><del><strong>your IP address&lt;/a&gt; so</strong></del></span> 
<span class="inserted"><ins><em>to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>advertisers can 
track</strong></del></span> <span class="inserted"><ins><em>country,
-    do</em></ins></span> you 
-      <span class="removed"><del><strong>across devices.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
+    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
  
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>think Amazon would have the moral 
fiber</em></ins></span> to <span class="removed"><del><strong>turn this 
off,</strong></del></span> <span class="inserted"><ins><em>say no?&lt;/p&gt;
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too,</em></ins></span> but 
<span class="removed"><del><strong>having it enabled</strong></del></span> 
<span class="inserted"><ins><em>please &lt;a
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
+      their users: their</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
 
-  &lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company &lt;a
-    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>default
+      &lt;p&gt;It is possible to turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>default
       is an injustice already.&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -3295,7 +3263,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 14:00:28 $
+$Date: 2019/07/10 13:00:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- po/proprietary-surveillance.it.po   27 Jun 2019 09:29:35 -0000      1.310
+++ po/proprietary-surveillance.it.po   10 Jul 2019 13:00:23 -0000      1.311
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-27 09:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1216,19 +1216,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- po/proprietary-surveillance.ja-diff.html    27 Jun 2019 14:00:29 -0000      
1.164
+++ po/proprietary-surveillance.ja-diff.html    10 Jul 2019 13:00:23 -0000      
1.165
@@ -629,78 +629,69 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said</em></ins></span> to 
<span class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
-        get them</strong></del></span> <span class="inserted"><ins><em>be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; 
secure</em></ins></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>personal data to</strong></del></span> Apple's 
<span class="removed"><del><strong>servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number</strong></del></span>
-    <span class="inserted"><ins><em>Apple or from 
governments</em></ins></span> that <span class="inserted"><ins><em>can command 
Apple's obedience (such
-    as</em></ins></span> the <span class="removed"><del><strong>user types 
into it&lt;/a&gt;; the server records these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>US and China).&lt;/p&gt;</em></ins></span>
+        a server every phone number</strong></del></span> <span 
class="inserted"><ins><em>supposed commitment to
+    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>the user types into it&lt;/a&gt;; the server 
records these numbers for</strong></del></span> <span 
class="inserted"><ins><em>are busy</em></ins></span> at <span 
class="removed"><del><strong>least 30
+        days.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
     sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
+      without giving a valid email address and receiving the code Apple
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
+    Channel (owned by IBM),</em></ins></span> the <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that</em></ins></span> most <span 
class="removed"><del><strong>popular iOS</strong></del></span> <span 
class="inserted"><ins><em>nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>contain
     trackers. Some of these send personally identifying data such as phone
-    fingerprint, exact location,</em></ins></span> email <span 
class="inserted"><ins><em>address, phone number or even
-    delivery</em></ins></span> address <span class="inserted"><ins><em>(in the 
case of DoorDash). Once this information
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
     is collected by the company, there is no telling what it will be
     used for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> the <span 
class="removed"><del><strong>code</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
     illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's</em></ins></span> Apple
-      <span class="removed"><del><strong>sends</strong></del></span> <span 
class="inserted"><ins><em>for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
+  &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
     lots</em></ins></span> of <span class="removed"><del><strong>their users 
with third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -776,19 +767,19 @@
   <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or 
it</em></ins></span>
-    is <span class="inserted"><ins><em>totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing</em></ins></span> also <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a</em></ins></span> feature for web sites to track 
users, which is &lt;a
+    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
@@ -862,24 +853,20 @@
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
     it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
-    the <span class="removed"><del><strong>contact list. This malware is 
designed to
-      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable</em></ins></span> phones <span 
class="removed"><del><strong>come with</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable phones &lt;a
+    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
@@ -887,17 +874,20 @@
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example of nonfree software pretending to obey the user,
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
+    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
+    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+    unthinkable with free software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data 
that</em></ins></span> their
+    that users can't delete&lt;/a&gt;, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
     of some
@@ -991,24 +981,25 @@
         surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app
+      &lt;a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
 scans your mobile phone's photo collections for known faces&lt;/a&gt;,
       and suggests you</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
@@ -1064,20 +1055,17 @@
 
     &lt;p&gt;This <span class="removed"><del><strong>article shows the &lt;a
 
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as</strong></del></span> 
<span class="inserted"><ins><em>making unauthorized copies of nonfree software
-    is not</em></ins></span> a <span class="removed"><del><strong>way
+      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a way
       to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is a typical example 
of</strong></del></span> <span class="inserted"><ins><em>cure 
for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
+    is <span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
-    apps</strong></del></span> the <span class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary 
apps</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1086,93 +1074,108 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> <span 
class="inserted"><ins><em>secretly</em></ins></span> a <span 
class="removed"><del><strong>way that at least is visible and
-    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
+    apps the user has
+    installed.</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
     for contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+    programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
+  &lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by 
the</strong></del></span> <span class="inserted"><ins><em>run a 
proprietary</em></ins></span> phone <span class="removed"><del><strong>company, 
and perhaps by the OS in the
-      phone.&lt;/p&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
 
-      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt; to</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>allowed 
into</em></ins></span>
-    the <span class="inserted"><ins><em>event.&lt;/p&gt;
-
-    &lt;p&gt;This</em></ins></span> app <span 
class="removed"><del><strong>developers get
-      users to say &ldquo;I agree&rdquo;. That</strong></del></span> is <span 
class="removed"><del><strong>no excuse for malware.&lt;/p&gt;
+    &lt;p&gt;This app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>at least is visible</strong></del></span> <span 
class="inserted"><ins><em>can snoop on a lot of
+    sensitive data, including user's location</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user</strong></del></span> <span class="inserted"><ins><em>a 
spyware that can snoop on a lot of
-    sensitive</em></ins></span> data, including <span 
class="removed"><del><strong>geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span> <span class="inserted"><ins><em>user's location and 
contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on 
the user&lt;/a&gt;. This</strong></del></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span class="inserted"><ins><em>employers 
and insurance companies&lt;/a&gt;. Even though</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
-      ask about sending</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="inserted"><ins><em>can 
easily be
-    traced back</em></ins></span> to <span class="removed"><del><strong>other 
companies.  This shows</strong></del></span> the
-      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>surveillance: 
why should a flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>equal employment
-    and freedom</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software 
flashlight</strong></del></span> <span class="inserted"><ins><em>make their own 
pregnancy choices. Don't use
+    available</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily</em></ins></span> be <span 
class="removed"><del><strong>distracted by</strong></del></span>
+    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>app developers get
+      users</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span class="inserted"><ins><em>equal 
employment
+    and freedom to make their own pregnancy choices. Don't use
     these apps, even if someone offers you a reward to do so. A
-    free-software</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
+    free-software app that does more or less the same thing without
+    spying on you</em></ins></span> is <span class="removed"><del><strong>no 
excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the</em></ins></span> data, <span class="removed"><del><strong>including 
geolocation, for use by companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>or pass</em></ins></span> it <span 
class="removed"><del><strong>asked the user</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps 
that have access</em></ins></span> to
+    the <span class="removed"><del><strong>app developer</strong></del></span> 
<span class="inserted"><ins><em>network</em></ins></span> but <span 
class="removed"><del><strong>did not
+      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>no direct access</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
+      weakness of</strong></del></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>data. This results</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>that does more 
or less the same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>massive
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and the NSA takes advantage</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
-      Here's information</strong></del></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which can use it</em></ins></span>
+    for <span class="removed"><del><strong>companies, and the NSA takes 
advantage to spy through</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising or discriminating against people 
in poor
+    medical condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
       More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
@@ -1181,31 +1184,19 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps that have access to
-    the network but no direct access to the data. This 
results</em></ins></span> in <span class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>is buried</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found</em></ins></span> 
that <span class="removed"><del><strong>makes internet-controlled vibrators 
&lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>19</em></ins></span> of <span 
class="inserted"><ins><em>them &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive</em></ins></span> personal <span 
class="removed"><del><strong>information about how
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting lots</strong></del></span>
+    <span class="inserted"><ins><em>lengthy terms</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
     people use it&lt;/a&gt;.&lt;/p&gt;
 
-       &lt;p&gt;The company's statement that it anonymizes 
the</strong></del></span> data <span class="removed"><del><strong>may be
-        true, but</strong></del></span> <span class="inserted"><ins><em>to 
third parties&lt;/a&gt;, which can use</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
-    medical condition.&lt;/p&gt;
-
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>sells the data</strong></del></span> 
<span class="inserted"><ins><em>is buried in
-    lengthy terms of service that are difficult to understand. In any case,
+       &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>service</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes the data may be
+        true, but it doesn't really matter. If it sells the 
data</strong></del></span> <span class="inserted"><ins><em>are difficult to 
understand. In any case,
     &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1217,16 +1208,15 @@
     way and released them, apparently not realizing that all</em></ins></span> 
the <span class="inserted"><ins><em>personal</em></ins></span>
     data <span class="removed"><del><strong>broker</strong></del></span> <span 
class="inserted"><ins><em>they collected would go to Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one</em></ins></span> can <span 
class="removed"><del><strong>figure out who</strong></del></span> <span 
class="inserted"><ins><em>trust a nonfree program, not even</em></ins></span> 
the <span class="removed"><del><strong>user is.&lt;/p&gt;
+    &lt;p&gt;It shows that no one</em></ins></span> can <span 
class="removed"><del><strong>figure out who</strong></del></span> <span 
class="inserted"><ins><em>trust a nonfree program, not even</em></ins></span> 
the <span class="removed"><del><strong>user is.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A computerized
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
         vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
         on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
-  &lt;/li&gt;
 
-  &lt;li id="M201902140"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;</em></ins></span>
     &lt;p&gt;The <span class="removed"><del><strong>app 
reports</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
@@ -1296,23 +1286,28 @@
     haven't yet, but they should also stay away from nonfree apps in
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
     there</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span> 
really
-<span class="removed"><del><strong>clean since &lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>protect their 
users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1322,17 +1317,12 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>users. 
Other technical flaws were
-    found as well.&lt;/p&gt;
-
-    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>Parliament
-  this way, because</strong></del></span>
-    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+  this way, because</strong></del></span> <span class="inserted"><ins><em>10 
gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
     apps.&rdquo; These apps are gratis, but</em></ins></span> they <span 
class="removed"><del><strong>pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
@@ -1399,22 +1389,34 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>about a side issue. 
What the company does
+    with the data is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="inserted"><ins><em>WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>about a side issue. 
What</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>user 
reads</strong></del></span> <span class="inserted"><ins><em>data is a secondary 
issue. The principal wrong here is that
-    the company gets that data</em></ins></span> at <span 
class="removed"><del><strong>what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>report even which page</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      send lots of</strong></del></span> data <span 
class="removed"><del><strong>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
       needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1425,36 +1427,23 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>all.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and 
WeatherBug,</em></ins></span> are
-  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>tracking people's 
locations.&lt;/p&gt;</em></ins></span> 
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
   effectively
-  anyone</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>do because</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
-    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>obtains from the same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that the user</em></ins></span> 
is
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in</strong></del></span> 
<span class="inserted"><ins><em>it obtains from the same machine 
via</em></ins></span>
+    various
+  <span class="removed"><del><strong>settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because</strong></del></span> <span 
class="inserted"><ins><em>apps. Some of them send Facebook detailed information 
about</em></ins></span>
+    the <span class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>user's activities in</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>app; others only say</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software in</strong></del></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is
     <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
@@ -1557,23 +1546,34 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
       Rent-to-own computers were programmed</strong></del></span>
-    <span class="inserted"><ins><em>other but not</em></ins></span> to <span 
class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the server's database.&lt;/p&gt;
+    <span class="inserted"><ins><em>other but not</em></ins></span> to <span 
class="inserted"><ins><em>the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
+    &lt;p&gt;The moviepass app and dis-service</em></ins></span>
+    spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
+&lt;p&gt;Emo Phillips made</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
+    follow</em></ins></span> a <span class="removed"><del><strong>joke: The 
other day</strong></del></span> <span class="inserted"><ins><em>user's 
movements around</em></ins></span> a <span class="removed"><del><strong>woman 
came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1596,7 +1596,11 @@
     discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    &lt;p&gt;On</em></ins></span> the other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More</strong></del></span> <span 
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
@@ -1608,8 +1612,8 @@
 
     &lt;p&gt;Google could demand the source code for these apps, and study
     the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
+    various ways. If it did a good job of this, it could 
more</em></ins></span> or less <span class="removed"><del><strong>all 
&ldquo;smart&rdquo; TVs</strong></del></span>
+    <span class="inserted"><ins><em>prevent such snooping, except when the app 
developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
@@ -1618,11 +1622,14 @@
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
-    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop on users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop</em></ins></span> on <span 
class="removed"><del><strong>their</strong></del></span> 
users&lt;/a&gt;.&lt;/p&gt;
+
+    <span class="removed"><del><strong>&lt;p&gt;The 
report</strong></del></span>
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
+    <span class="inserted"><ins><em>&lt;p&gt;With free software apps, users 
could &lt;em&gt;make sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
@@ -2323,14 +2330,14 @@
   &lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
@@ -2344,21 +2351,19 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201905061"&gt;
     &lt;p&gt;Amazon Alexa collects a lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings</em></ins></span> made <span 
class="inserted"><ins><em>without</em></ins></span> a <span 
class="removed"><del><strong>joke: The</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt), and sends
+    recordings made without a legitimate prompt), and sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
     even if users request deletion of their data from Amazon's servers, &lt;a
     
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on</em></ins></span> other <span 
class="removed"><del><strong>day</strong></del></span> <span 
class="inserted"><ins><em>servers&lt;/a&gt;, where they can be accessed by
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
     advertising companies and government agencies. In other words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
@@ -2367,16 +2372,15 @@
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
     the devices are tethered to. Moreover, they are made available to
-    Alexa. As</em></ins></span> a <span class="removed"><del><strong>woman 
came up</strong></del></span> <span class="inserted"><ins><em>result, Amazon 
has a very precise picture of users' life
+    Alexa. As a result, Amazon has a very precise picture of users' life
     at home, not only in the present, but in the past (and, who knows,
     in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>the Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The 
Google</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I 
see</strong></del></span> <span class="inserted"><ins><em>Apple
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
     &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
@@ -2386,7 +2390,7 @@
     &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell</em></ins></span> you <span class="inserted"><ins><em>how and where 
it's done&rdquo;), users have no way
+    tell you how and where it's done&rdquo;), users have no way
     to know what happens to the recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
     break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
@@ -2401,23 +2405,14 @@
     paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
-    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>use of ink cartridges</em></ins></span> that 
<span class="removed"><del><strong>was
-before</strong></del></span> <span class="inserted"><ins><em>would otherwise 
be in
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of 
an</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>device,
-    and</em></ins></span> &lt;a <span class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
@@ -3120,7 +3115,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 14:00:29 $
+$Date: 2019/07/10 13:00:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- po/proprietary-surveillance.ja.po   27 Jun 2019 09:29:35 -0000      1.289
+++ po/proprietary-surveillance.ja.po   10 Jul 2019 13:00:24 -0000      1.290
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-27 09:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -908,19 +908,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- po/proprietary-surveillance.pot     27 Jun 2019 09:29:35 -0000      1.231
+++ po/proprietary-surveillance.pot     10 Jul 2019 13:00:24 -0000      1.232
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-27 09:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -658,20 +658,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a "
-"href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\";> track "
-"iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a "
 
"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\";>
 "

Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- po/proprietary-surveillance.ru-en.html      27 Jun 2019 14:00:29 -0000      
1.184
+++ po/proprietary-surveillance.ru-en.html      10 Jul 2019 13:00:24 -0000      
1.185
@@ -494,17 +494,6 @@
 </div>
 
 <ul class="blurbs">
-  <li id="M201906030">
-    <p>Apple can <a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-    track iMonsters even when they are suspended</a>.</p>
-
-    <p>This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously <em>not</em> secure from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).</p>
-  </li>
-
   <li id="M201905280">
     <p>In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night <a
@@ -2433,7 +2422,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/27 14:00:29 $
+$Date: 2019/07/10 13:00:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.543
retrieving revision 1.544
diff -u -b -r1.543 -r1.544
--- po/proprietary-surveillance.ru.po   27 Jun 2019 14:00:29 -0000      1.543
+++ po/proprietary-surveillance.ru.po   10 Jul 2019 13:00:24 -0000      1.544
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-27 09:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -891,24 +891,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple может <a 
href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
-"my-app/\"> отслежвать ай-чудищ, даже когда они 
в спящем режиме</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Говорят, что эта распределенная сеть Bluetooth 
&ldquo;защищена&rdquo;, но "
-"она с очевидностью <em>не</em> защищена от Apple 
или правящих режимов, "
-"которые могут подчинить себе Apple (таких 
как США и Китай)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
@@ -4486,6 +4468,22 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
+#~ msgid ""
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple может <a 
href=\"https://www.macrumors.com/2019/06/03/apples-new-";
+#~ "find-my-app/\"> отслежвать ай-чудищ, даже когда 
они в спящем режиме</a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Говорят, что эта распределенная сеть 
Bluetooth &ldquo;защищена&rdquo;, но "
+#~ "она с очевидностью <em>не</em> защищена от 
Apple или правящих режимов, "
+#~ "которые могут подчинить себе Apple (таких 
как США и Китай)."
+
 #~ msgid "Latest additions are found on top under each category."
 #~ msgstr "Последние добавления находятся в 
начале каждого раздела."
 

Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- po/proprietary.de-diff.html 30 Jun 2019 08:29:21 -0000      1.101
+++ po/proprietary.de-diff.html 10 Jul 2019 13:00:24 -0000      1.102
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -45,10 +45,10 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -128,17 +128,17 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -237,17 +237,6 @@
     used for.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can &lt;a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -257,6 +246,28 @@
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -317,7 +328,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/30 08:29:21 $
+$Date: 2019/07/10 13:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- po/proprietary.de.po        30 Jun 2019 08:29:21 -0000      1.143
+++ po/proprietary.de.po        10 Jul 2019 13:00:24 -0000      1.144
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -499,27 +499,38 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
+"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
+"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
+"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
+"Christians.  It spreads distrust for contraception."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
+msgid "It snoops on users, too, as you must expect from nonfree programs."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
 msgstr ""
 
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/proprietary.es-en.html   1 Jul 2019 09:29:18 -0000       1.53
+++ po/proprietary.es-en.html   10 Jul 2019 13:00:24 -0000      1.54
@@ -198,17 +198,6 @@
     used for.</p>
   </li>
 
-  <li id="M201906030">
-    <p>Apple can <a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-    track iMonsters even when they are suspended</a>.</p>
-
-    <p>This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously <em>not</em> secure from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).</p>
-  </li>
-
   <li id="M201905300">
     <p>The Femm &ldquo;fertility&rdquo; app is secretly a <a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
@@ -218,6 +207,28 @@
     <p>It snoops on users, too, as you must expect from nonfree
     programs.</p>
   </li>
+
+  <li id="M201905061">
+    <p>Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, <a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>
+    the data remain on other servers</a>, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.</p>
+
+    <p>Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)</p>
+  </li>
 </ul>
 
 
@@ -278,7 +289,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/07/01 09:29:18 $
+$Date: 2019/07/10 13:00:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- po/proprietary.es.po        1 Jul 2019 09:05:47 -0000       1.178
+++ po/proprietary.es.po        10 Jul 2019 13:00:24 -0000      1.179
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -400,25 +400,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple puede <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
-"my-app/\">rastrear los iMonsturos incluso cuando se encuentran en modo "
-"<em>suspendido</em></a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Se dice que esta red de bluetooth distribuida es «segura», pero obviamente "
-"<em>no</em> lo es frente a Apple o los Gobiernos que puedan exigir "
-"obediencia a Apple (como EE.UU. o China)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -436,6 +417,47 @@
 "Además, espía a los usuarios, como cabe esperar de cualquier programa que 
no "
 "sea libre."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+"Amazon Alexa recoge de los usuarios mucha más información de la necesaria "
+"para su correcto funcionamiento (hora, localización, grabaciones realizadas "
+"sin una orden explícita), y la envía a los servidores de Amazon, que la "
+"guardan indefinidamente. Aún más, Amazon la reenvía a otras compañías. 
De "
+"este modo, aun cuando los usuarios soliciten que se borren sus datos de los "
+"servidores de Amazon, <a href=\"https://www.ctpost.com/business/article/";
+"Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php\">esos datos "
+"permanecerán en otros servidores</a>, quedando así al alcance de 
compañías "
+"publicitarias y agencias gubernamentales. En otras palabras, borrar la "
+"información recopilada no deshace el daño causado al recopilarla."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+"Los datos recopilados por dispositivos como el termostato Nest, el sistema "
+"de iluminación Philips Hue, el controlador para puertas de garaje "
+"Chamberlain MyQ y los altavoces Sonos se guardan también más tiempo del "
+"necesario en los servidores a los que tales dispositivos están conectados. "
+"Más aún, esos datos quedan a disposición de Alexa. En consecuencia, Amazon 
"
+"tiene una precisa imagen de la vida del usuario en su hogar, no solo en el "
+"presente, sino también en el pasado (y, quién sabe si también en el 
futuro)."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -515,45 +537,21 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
-#~ "Amazon Alexa collects a lot more information from users than is necessary "
-#~ "for correct functioning (time, location, recordings made without a "
-#~ "legitimate prompt), and sends it to Amazon's servers, which store it "
-#~ "indefinitely. Even worse, Amazon forwards it to third-party companies. "
-#~ "Thus, even if users request deletion of their data from Amazon's servers, "
-#~ "<a href=\"https://www.ctpost.com/business/article/Alexa-has-been-";
-#~ "eavesdropping-on-you-this-whole-13822095.php\"> the data remain on other "
-#~ "servers</a>, where they can be accessed by advertising companies and "
-#~ "government agencies. In other words, deleting the collected information "
-#~ "doesn't cancel the wrong of collecting it."
-#~ msgstr ""
-#~ "Amazon Alexa recoge de los usuarios mucha más información de la 
necesaria "
-#~ "para su correcto funcionamiento (hora, localización, grabaciones "
-#~ "realizadas sin una orden explícita), y la envía a los servidores de "
-#~ "Amazon, que la guardan indefinidamente. Aún más, Amazon la reenvía a "
-#~ "otras compañías. De este modo, aun cuando los usuarios soliciten que se "
-#~ "borren sus datos de los servidores de Amazon, <a href=\"https://www.";
-#~ "ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-"
-#~ "whole-13822095.php\">esos datos permanecerán en otros servidores</a>, "
-#~ "quedando así al alcance de compañías publicitarias y agencias "
-#~ "gubernamentales. En otras palabras, borrar la información recopilada no "
-#~ "deshace el daño causado al recopilarla."
-
-#~ msgid ""
-#~ "Data collected by devices such as the Nest thermostat, the Philips Hue-"
-#~ "connected lights, the Chamberlain MyQ garage opener and the Sonos "
-#~ "speakers are likewise stored longer than necessary on the servers the "
-#~ "devices are tethered to. Moreover, they are made available to Alexa. As a "
-#~ "result, Amazon has a very precise picture of users' life at home, not "
-#~ "only in the present, but in the past (and, who knows, in the future too?)"
-#~ msgstr ""
-#~ "Los datos recopilados por dispositivos como el termostato Nest, el "
-#~ "sistema de iluminación Philips Hue, el controlador para puertas de garaje 
"
-#~ "Chamberlain MyQ y los altavoces Sonos se guardan también más tiempo del "
-#~ "necesario en los servidores a los que tales dispositivos están "
-#~ "conectados. Más aún, esos datos quedan a disposición de Alexa. En "
-#~ "consecuencia, Amazon tiene una precisa imagen de la vida del usuario en "
-#~ "su hogar, no solo en el presente, sino también en el pasado (y, quién "
-#~ "sabe si también en el futuro)."
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple puede <a href=\"https://www.macrumors.com/2019/06/03/apples-new-";
+#~ "find-my-app/\">rastrear los iMonsturos incluso cuando se encuentran en "
+#~ "modo <em>suspendido</em></a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Se dice que esta red de bluetooth distribuida es «segura», pero "
+#~ "obviamente <em>no</em> lo es frente a Apple o los Gobiernos que puedan "
+#~ "exigir obediencia a Apple (como EE.UU. o China)."
 
 #~ msgid ""
 #~ "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";

Index: po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- po/proprietary.fr-en.html   30 Jun 2019 13:29:38 -0000      1.95
+++ po/proprietary.fr-en.html   10 Jul 2019 13:00:24 -0000      1.96
@@ -198,17 +198,6 @@
     used for.</p>
   </li>
 
-  <li id="M201906030">
-    <p>Apple can <a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-    track iMonsters even when they are suspended</a>.</p>
-
-    <p>This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously <em>not</em> secure from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).</p>
-  </li>
-
   <li id="M201905300">
     <p>The Femm &ldquo;fertility&rdquo; app is secretly a <a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
@@ -218,6 +207,28 @@
     <p>It snoops on users, too, as you must expect from nonfree
     programs.</p>
   </li>
+
+  <li id="M201905061">
+    <p>Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, <a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>
+    the data remain on other servers</a>, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.</p>
+
+    <p>Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)</p>
+  </li>
 </ul>
 
 
@@ -278,7 +289,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/30 13:29:38 $
+$Date: 2019/07/10 13:00:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- po/proprietary.fr.po        30 Jun 2019 13:07:08 -0000      1.220
+++ po/proprietary.fr.po        10 Jul 2019 13:00:24 -0000      1.221
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2019-06-30 15:06+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -397,25 +397,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple peut <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\">pister les iMonstres même lorsqu'ils sont en mode <cite>suspend</"
-"cite></a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Ce réseau Bluetooth distribué a la réputation d'être « sécurisé », 
mais à "
-"l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des États 
qui "
-"peuvent forcer Apple à leur obéir (comme les États-Unis ou la Chine)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -432,6 +413,46 @@
 "De plus, elle espionne les utilisatrices, comme on peut s'y attendre de la "
 "part d'un programme non libre."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+"Alexa, l'assistant vocal d'Amazon, récolte beaucoup plus d'information que "
+"nécessaire (heure, localisation, enregistrements déclenchés sans mot-clé "
+"valable), puis l'envoie aux serveurs d'Amazon où elle est conservée "
+"indéfiniment. Pire, Amazon la transmet à des sociétés tierces. Ainsi, 
même "
+"si les utilisateurs demandent la suppression de leurs données sur les "
+"serveurs d'Amazon, <a href=\"https://www.ctpost.com/business/article/Alexa-";
+"has-been-eavesdropping-on-you-this-whole-13822095.php\">elles restent sur "
+"d'autres serveurs</a> où des publicitaires et des services gouvernementaux "
+"peuvent les récupérer. En d'autres termes, la suppression de l'information "
+"récoltée n'annule pas le mal causé par sa collecte."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+"Les données collectées par des appareils comme le thermostat Nest, les "
+"ampoules connectées Philips Hue, la commande de porte de garage MyQ de "
+"Chamberlain et les haut-parleurs Sonos sont également conservées plus "
+"longtemps que nécessaire. De plus, Alexa y a accès. Tout ceci donne à 
Amazon "
+"une idée très précise de la vie des habitants de la maison, non seulement 
au "
+"moment présent, mais aussi dans le passé (et, qui sait, dans le futur ?)"
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,3 +526,20 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple peut <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\">pister les iMonstres même lorsqu'ils sont en mode "
+#~ "<cite>suspend</cite></a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Ce réseau Bluetooth distribué a la réputation d'être « sécurisé 
», mais à "
+#~ "l'évidence il <em>n'est pas</em> sécurisé vis-à-vis d'Apple ni des 
États "
+#~ "qui peuvent forcer Apple à leur obéir (comme les États-Unis ou la 
Chine)."

Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- po/proprietary.it-diff.html 30 Jun 2019 08:29:21 -0000      1.113
+++ po/proprietary.it-diff.html 10 Jul 2019 13:00:24 -0000      1.114
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -160,10 +160,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -236,17 +236,6 @@
     used for.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can &lt;a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -256,6 +245,28 @@
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -316,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/30 08:29:21 $
+$Date: 2019/07/10 13:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- po/proprietary.it.po        30 Jun 2019 08:29:21 -0000      1.152
+++ po/proprietary.it.po        10 Jul 2019 13:00:24 -0000      1.153
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -503,27 +503,38 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
+"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
+"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
+"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
+"Christians.  It spreads distrust for contraception."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
+msgid "It snoops on users, too, as you must expect from nonfree programs."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- po/proprietary.ja-diff.html 30 Jun 2019 08:29:21 -0000      1.116
+++ po/proprietary.ja-diff.html 10 Jul 2019 13:00:24 -0000      1.117
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -233,17 +233,6 @@
     used for.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can &lt;a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -253,6 +242,28 @@
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -313,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/30 08:29:21 $
+$Date: 2019/07/10 13:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- po/proprietary.ja.po        30 Jun 2019 08:29:21 -0000      1.136
+++ po/proprietary.ja.po        10 Jul 2019 13:00:24 -0000      1.137
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -367,27 +367,38 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
+"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
+"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
+"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
+"Christians.  It spreads distrust for contraception."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
+msgid "It snoops on users, too, as you must expect from nonfree programs."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- po/proprietary.nl-diff.html 30 Jun 2019 08:29:21 -0000      1.113
+++ po/proprietary.nl-diff.html 10 Jul 2019 13:00:24 -0000      1.114
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -160,10 +160,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -236,17 +236,6 @@
     used for.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can &lt;a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -256,6 +245,28 @@
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -316,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/30 08:29:21 $
+$Date: 2019/07/10 13:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- po/proprietary.nl.po        30 Jun 2019 08:29:21 -0000      1.124
+++ po/proprietary.nl.po        10 Jul 2019 13:00:24 -0000      1.125
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -496,27 +496,38 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
+"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
+"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
+"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
+"Christians.  It spreads distrust for contraception."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
+msgid "It snoops on users, too, as you must expect from nonfree programs."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- po/proprietary.pl-diff.html 30 Jun 2019 08:29:21 -0000      1.131
+++ po/proprietary.pl-diff.html 10 Jul 2019 13:00:24 -0000      1.132
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>April, 2019, the pages in this directory list 
around 400
-instances of malicious functionalities (with more than 450 references to
+&lt;p&gt;As of April, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 450 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -127,18 +127,18 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -234,17 +234,6 @@
     used for.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can &lt;a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -254,6 +243,28 @@
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -314,7 +325,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/30 08:29:21 $
+$Date: 2019/07/10 13:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- po/proprietary.pl.po        30 Jun 2019 08:29:21 -0000      1.119
+++ po/proprietary.pl.po        10 Jul 2019 13:00:24 -0000      1.120
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -579,27 +579,38 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
+"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
+"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
+"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
+"Christians.  It spreads distrust for contraception."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
+msgid "It snoops on users, too, as you must expect from nonfree programs."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- po/proprietary.pot  30 Jun 2019 08:29:21 -0000      1.116
+++ po/proprietary.pot  10 Jul 2019 13:00:24 -0000      1.117
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -310,28 +310,37 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a "
-"href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\";> track "
-"iMonsters even when they are suspended</a>."
+"The Femm &ldquo;fertility&rdquo; app is secretly a <a "
+"href=\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners\";>
 "
+"tool for propaganda</a> by natalist Christians.  It spreads distrust for "
+"contraception."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
+msgid "It snoops on users, too, as you must expect from nonfree programs."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a "
-"href=\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners\";>
 "
-"tool for propaganda</a> by natalist Christians.  It spreads distrust for "
-"contraception."
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a "
+"href=\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php\";>
 "
+"the data remain on other servers</a>, where they can be accessed by "
+"advertising companies and government agencies. In other words, deleting the "
+"collected information doesn't cancel the wrong of collecting it."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips "
+"Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos "
+"speakers are likewise stored longer than necessary on the servers the "
+"devices are tethered to. Moreover, they are made available to Alexa. As a "
+"result, Amazon has a very precise picture of users' life at home, not only "
+"in the present, but in the past (and, who knows, in the future too?)"
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: po/proprietary.pt-br-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-en.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/proprietary.pt-br-en.html        1 Jul 2019 22:58:33 -0000       1.47
+++ po/proprietary.pt-br-en.html        10 Jul 2019 13:00:24 -0000      1.48
@@ -198,17 +198,6 @@
     used for.</p>
   </li>
 
-  <li id="M201906030">
-    <p>Apple can <a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-    track iMonsters even when they are suspended</a>.</p>
-
-    <p>This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously <em>not</em> secure from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).</p>
-  </li>
-
   <li id="M201905300">
     <p>The Femm &ldquo;fertility&rdquo; app is secretly a <a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
@@ -218,6 +207,28 @@
     <p>It snoops on users, too, as you must expect from nonfree
     programs.</p>
   </li>
+
+  <li id="M201905061">
+    <p>Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, <a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>
+    the data remain on other servers</a>, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.</p>
+
+    <p>Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)</p>
+  </li>
 </ul>
 
 
@@ -278,7 +289,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/07/01 22:58:33 $
+$Date: 2019/07/10 13:00:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- po/proprietary.pt-br.po     1 Jul 2019 22:58:33 -0000       1.179
+++ po/proprietary.pt-br.po     10 Jul 2019 13:00:24 -0000      1.180
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2019-07-01 02:08-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -392,24 +392,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"A Apple pode <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
-"my-app/\"> rastrear iMonstros mesmo quando eles estão suspensos</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Esta rede Bluetooth distribuída é considerada “segura”, mas obviamente "
-"<em>não</em> é seguro da Apple ou de governos que possam comandar a "
-"obediência da Apple (como os EUA e a China)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -426,6 +408,47 @@
 "Ele espiona os usuários também, como você deve esperar de programas não "
 "livres."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+"O Amazon Alexa coleta muito mais informações dos usuários do que o "
+"necessário para o funcionamento correto (hora, local, gravações feitas sem 
"
+"uma solicitação legítima) e as envia para os servidores da Amazon, que os "
+"armazenam indefinidamente. Pior ainda, a Amazon encaminha para empresas "
+"terceirizadas. Assim, mesmo que os usuários solicitem a exclusão de seus "
+"dados dos servidores da Amazon, <a href=\"https://www.ctpost.com/business/";
+"article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php\"> os "
+"dados permanecem em outros servidores</a>, onde eles podem ser acessados por "
+"empresas de publicidade e agências governamentais. Em outras palavras, "
+"excluir as informações coletadas não cancela o erro de coletá-las."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+"Os dados coletados por dispositivos como o termostato Nest, as luzes "
+"conectadas a Philips Hue, o abridor de garagem Chamberlain MyQ e os alto-"
+"falantes da Sonos também são armazenados por mais tempo do que o 
necessário "
+"nos servidores aos quais os dispositivos estão ligados. Além disso, eles 
são "
+"disponibilizados para o Alexa. Como resultado, a Amazon tem uma imagem muito "
+"precisa da vida dos usuários em casa, não apenas no presente, mas no 
passado "
+"(e, quem sabe, no futuro também?)"
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -501,44 +524,20 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
-#~ "Amazon Alexa collects a lot more information from users than is necessary "
-#~ "for correct functioning (time, location, recordings made without a "
-#~ "legitimate prompt), and sends it to Amazon's servers, which store it "
-#~ "indefinitely. Even worse, Amazon forwards it to third-party companies. "
-#~ "Thus, even if users request deletion of their data from Amazon's servers, "
-#~ "<a href=\"https://www.ctpost.com/business/article/Alexa-has-been-";
-#~ "eavesdropping-on-you-this-whole-13822095.php\"> the data remain on other "
-#~ "servers</a>, where they can be accessed by advertising companies and "
-#~ "government agencies. In other words, deleting the collected information "
-#~ "doesn't cancel the wrong of collecting it."
-#~ msgstr ""
-#~ "O Amazon Alexa coleta muito mais informações dos usuários do que o "
-#~ "necessário para o funcionamento correto (hora, local, gravações feitas "
-#~ "sem uma solicitação legítima) e as envia para os servidores da Amazon, "
-#~ "que os armazenam indefinidamente. Pior ainda, a Amazon encaminha para "
-#~ "empresas terceirizadas. Assim, mesmo que os usuários solicitem a 
exclusão "
-#~ "de seus dados dos servidores da Amazon, <a href=\"https://www.ctpost.com/";
-#~ "business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095."
-#~ "php\"> os dados permanecem em outros servidores</a>, onde eles podem ser "
-#~ "acessados por empresas de publicidade e agências governamentais. Em "
-#~ "outras palavras, excluir as informações coletadas não cancela o erro de 
"
-#~ "coletá-las."
-
-#~ msgid ""
-#~ "Data collected by devices such as the Nest thermostat, the Philips Hue-"
-#~ "connected lights, the Chamberlain MyQ garage opener and the Sonos "
-#~ "speakers are likewise stored longer than necessary on the servers the "
-#~ "devices are tethered to. Moreover, they are made available to Alexa. As a "
-#~ "result, Amazon has a very precise picture of users' life at home, not "
-#~ "only in the present, but in the past (and, who knows, in the future too?)"
-#~ msgstr ""
-#~ "Os dados coletados por dispositivos como o termostato Nest, as luzes "
-#~ "conectadas a Philips Hue, o abridor de garagem Chamberlain MyQ e os alto-"
-#~ "falantes da Sonos também são armazenados por mais tempo do que o "
-#~ "necessário nos servidores aos quais os dispositivos estão ligados. Além 
"
-#~ "disso, eles são disponibilizados para o Alexa. Como resultado, a Amazon "
-#~ "tem uma imagem muito precisa da vida dos usuários em casa, não apenas no 
"
-#~ "presente, mas no passado (e, quem sabe, no futuro também?)"
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "A Apple pode <a href=\"https://www.macrumors.com/2019/06/03/apples-new-";
+#~ "find-my-app/\"> rastrear iMonstros mesmo quando eles estão suspensos</a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Esta rede Bluetooth distribuída é considerada “segura”, mas 
obviamente "
+#~ "<em>não</em> é seguro da Apple ou de governos que possam comandar a "
+#~ "obediência da Apple (como os EUA e a China)."
 
 #~ msgid ""
 #~ "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";

Index: po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- po/proprietary.ru-en.html   30 Jun 2019 08:58:55 -0000      1.101
+++ po/proprietary.ru-en.html   10 Jul 2019 13:00:24 -0000      1.102
@@ -198,17 +198,6 @@
     used for.</p>
   </li>
 
-  <li id="M201906030">
-    <p>Apple can <a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/";>
-    track iMonsters even when they are suspended</a>.</p>
-
-    <p>This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously <em>not</em> secure from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).</p>
-  </li>
-
   <li id="M201905300">
     <p>The Femm &ldquo;fertility&rdquo; app is secretly a <a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
@@ -218,6 +207,28 @@
     <p>It snoops on users, too, as you must expect from nonfree
     programs.</p>
   </li>
+
+  <li id="M201905061">
+    <p>Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, <a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>
+    the data remain on other servers</a>, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.</p>
+
+    <p>Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)</p>
+  </li>
 </ul>
 
 
@@ -278,7 +289,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/30 08:58:55 $
+$Date: 2019/07/10 13:00:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- po/proprietary.ru.po        30 Jun 2019 08:58:55 -0000      1.256
+++ po/proprietary.ru.po        10 Jul 2019 13:00:24 -0000      1.257
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -398,24 +398,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple может <a 
href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
-"my-app/\"> отслежвать ай-чудищ, даже когда они 
в спящем режиме</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Говорят, что эта распределенная сеть Bluetooth 
&ldquo;защищена&rdquo;, но "
-"она с очевидностью <em>не</em> защищена от Apple 
или правящих режимов, "
-"которые могут подчинить себе Apple (таких 
как США и Китай)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -432,6 +414,47 @@
 "Оно еще и подглядывает за пользователями, 
как и следует ожидать от "
 "несвободных программ."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+"Amazon Alexa собирает гораздо больше 
информации о пользователях, чем "
+"необходимо для правильного 
функционирования (время, место, записи, 
сделанные "
+"без надлежащего уведомления), и 
отправляет ее на серверы Amazon, которые "
+"хранят их неопределенное время. Хуже того, 
Amazon пересылает ее в другие "
+"компании. Тем самым, даже если 
пользователи запрашивают удаление своих "
+"данных с серверов Amazon <a 
href=\"https://www.ctpost.com/business/article/";
+"Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php\"> данные "
+"остаются на других серверах</a>, где их 
могут получать рекламные компании, а "
+"также государственные органы. Другими 
словами, удаление собранной информации "
+"не прекращает вреда от ее сбора."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+"Данные, собранные такими устройствами как 
термостат Nest, сетевые "
+"светильники Philips Hue, устройство открывания 
гаража Chamberlain MyQ и "
+"колонки Sonos таким же образом хранятся 
дольше, чем необходимо, на серверах, "
+"к которым привязаны эти устройства. Более 
того, их передают в Alexa. В "
+"результате у Amazon появляется очень точная 
картина домашней жизни "
+"пользователя, не только в настоящем, но и в 
прошлом (и&nbsp;&mdash; кто "
+"знает?&nbsp;&mdash; может быть, и в будущем)."
+
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -511,44 +534,20 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
-#~ "Amazon Alexa collects a lot more information from users than is necessary "
-#~ "for correct functioning (time, location, recordings made without a "
-#~ "legitimate prompt), and sends it to Amazon's servers, which store it "
-#~ "indefinitely. Even worse, Amazon forwards it to third-party companies. "
-#~ "Thus, even if users request deletion of their data from Amazon's servers, "
-#~ "<a href=\"https://www.ctpost.com/business/article/Alexa-has-been-";
-#~ "eavesdropping-on-you-this-whole-13822095.php\"> the data remain on other "
-#~ "servers</a>, where they can be accessed by advertising companies and "
-#~ "government agencies. In other words, deleting the collected information "
-#~ "doesn't cancel the wrong of collecting it."
-#~ msgstr ""
-#~ "Amazon Alexa собирает гораздо больше 
информации о пользователях, чем "
-#~ "необходимо для правильного 
функционирования (время, место, записи, "
-#~ "сделанные без надлежащего уведомления), 
и отправляет ее на серверы "
-#~ "Amazon, которые хранят их неопределенное 
время. Хуже того, Amazon "
-#~ "пересылает ее в другие компании. Тем 
самым, даже если пользователи "
-#~ "запрашивают удаление своих данных с 
серверов Amazon <a href=\"https://www.";
-#~ "ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-"
-#~ "whole-13822095.php\"> данные остаются на других 
серверах</a>, где их "
-#~ "могут получать рекламные компании, а 
также государственные органы. "
-#~ "Другими словами, удаление собранной 
информации не прекращает вреда от ее "
-#~ "сбора."
-
-#~ msgid ""
-#~ "Data collected by devices such as the Nest thermostat, the Philips Hue-"
-#~ "connected lights, the Chamberlain MyQ garage opener and the Sonos "
-#~ "speakers are likewise stored longer than necessary on the servers the "
-#~ "devices are tethered to. Moreover, they are made available to Alexa. As a "
-#~ "result, Amazon has a very precise picture of users' life at home, not "
-#~ "only in the present, but in the past (and, who knows, in the future too?)"
-#~ msgstr ""
-#~ "Данные, собранные такими устройствами 
как термостат Nest, сетевые "
-#~ "светильники Philips Hue, устройство 
открывания гаража Chamberlain MyQ и "
-#~ "колонки Sonos таким же образом хранятся 
дольше, чем необходимо, на "
-#~ "серверах, к которым привязаны эти 
устройства. Более того, их передают в "
-#~ "Alexa. В результате у Amazon появляется очень 
точная картина домашней "
-#~ "жизни пользователя, не только в 
настоящем, но и в прошлом (и&nbsp;&mdash; "
-#~ "кто знает?&nbsp;&mdash; может быть, и в 
будущем)."
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple может <a 
href=\"https://www.macrumors.com/2019/06/03/apples-new-";
+#~ "find-my-app/\"> отслежвать ай-чудищ, даже когда 
они в спящем режиме</a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Говорят, что эта распределенная сеть 
Bluetooth &ldquo;защищена&rdquo;, но "
+#~ "она с очевидностью <em>не</em> защищена от 
Apple или правящих режимов, "
+#~ "которые могут подчинить себе Apple (таких 
как США и Китай)."
 
 #~ msgid ""
 #~ "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";

Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- po/proprietary.zh-tw-diff.html      30 Jun 2019 08:29:21 -0000      1.91
+++ po/proprietary.zh-tw-diff.html      10 Jul 2019 13:00:26 -0000      1.92
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -45,10 +45,10 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -128,17 +128,17 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -237,17 +237,6 @@
     used for.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201906030"&gt;
-    &lt;p&gt;Apple can &lt;a
-    href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/"&gt;
-    track iMonsters even when they are suspended&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This distributed bluetooth network is said to be
-    &ldquo;secure,&rdquo; but it is obviously &lt;em&gt;not&lt;/em&gt; secure 
from
-    Apple or from governments that can command Apple's obedience (such
-    as the US and China).&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -257,6 +246,28 @@
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -317,7 +328,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/30 08:29:21 $
+$Date: 2019/07/10 13:00:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- po/proprietary.zh-tw.po     30 Jun 2019 08:29:21 -0000      1.102
+++ po/proprietary.zh-tw.po     10 Jul 2019 13:00:26 -0000      1.103
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-30 08:25+0000\n"
+"POT-Creation-Date: 2019-07-10 12:55+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -410,27 +410,38 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
+"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
+"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
+"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
+"Christians.  It spreads distrust for contraception."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
+msgid "It snoops on users, too, as you must expect from nonfree programs."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-";
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- po/pt-br.po 1 Jul 2019 22:58:34 -0000       1.133
+++ po/pt-br.po 10 Jul 2019 13:00:26 -0000      1.134
@@ -1157,24 +1157,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"A Apple pode <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
-"my-app/\"> rastrear iMonstros mesmo quando eles estão suspensos</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Esta rede Bluetooth distribuída é considerada “segura”, mas obviamente "
-"<em>não</em> é seguro da Apple ou de governos que possam comandar a "
-"obediência da Apple (como os EUA e a China)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
@@ -8113,6 +8095,22 @@
 msgstr ""
 
 #~ msgid ""
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "A Apple pode <a href=\"https://www.macrumors.com/2019/06/03/apples-new-";
+#~ "find-my-app/\"> rastrear iMonstros mesmo quando eles estão suspensos</a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Esta rede Bluetooth distribuída é considerada “segura”, mas 
obviamente "
+#~ "<em>não</em> é seguro da Apple ou de governos que possam comandar a "
+#~ "obediência da Apple (como os EUA e a China)."
+
+#~ msgid ""
 #~ "Learn how <a href=\"https://www.huffingtonpost.com/joseph-farrell/the-";
 #~ "fascinating-psycholog_b_6076502.html\"> gratis-to-play-and-not-win-much "
 #~ "games manipulate their useds psychologically</a>."

Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- po/ru.po    30 Jun 2019 08:51:37 -0000      1.228
+++ po/ru.po    10 Jul 2019 13:00:26 -0000      1.229
@@ -1470,24 +1470,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-"Apple может <a 
href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
-"my-app/\"> отслежвать ай-чудищ, даже когда они 
в спящем режиме</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-"Говорят, что эта распределенная сеть Bluetooth 
&ldquo;защищена&rdquo;, но "
-"она с очевидностью <em>не</em> защищена от Apple 
или правящих режимов, "
-"которые могут подчинить себе Apple (таких 
как США и Китай)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
@@ -3874,10 +3856,10 @@
 "is clearly described in an infographic."
 msgstr ""
 "Разработчики бесплатных мобильных игр 
применяют <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> приемы 
манипуляции поведением</a>, "
-"чтобы <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> превратить свои продукты в 
автоматы для азартных "
-"игр</a>. Это наглядно показано на 
иллюстрации."
+"proprietary-addictions.html#addictiveness\"> приемы 
манипуляции поведением</"
+"a>, чтобы <a 
href=\"https://www.psychguides.com/interact/the-psychology-of-";
+"freemium/\"> превратить свои продукты в 
автоматы для азартных игр</a>. Это "
+"наглядно показано на иллюстрации."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -3897,8 +3879,8 @@
 "&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
 "К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в значении "
-"&ldquo;нулевой цены&rdquo;. Мы рекомендуем 
вместо этого говорить "
-"&ldquo;бесплатный&rdquo;."
+"&ldquo;нулевой цены&rdquo;. Мы рекомендуем 
вместо этого говорить &ldquo;"
+"бесплатный&rdquo;."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -7984,10 +7966,10 @@
 "machines</a>. This is clearly described in an infographic."
 msgstr ""
 "Разработчики бесплатных мобильных игр 
применяют <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\">описанные выше 
приемы</a>, "
-"чтобы <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> превратить свои продукты в 
автоматы для азартных "
-"игр</a>. Это наглядно показано на 
иллюстрации."
+"proprietary-addictions.html#addictiveness\">описанные выше 
приемы</a>, чтобы "
+"<a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
+"\"> превратить свои продукты в автоматы для 
азартных игр</a>. Это наглядно "
+"показано на иллюстрации."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -10488,6 +10470,22 @@
 "процессорах Intel будут встроенные 
несвободные программы-тираны</a>."
 
 #~ msgid ""
+#~ "Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-";
+#~ "my-app/\"> track iMonsters even when they are suspended</a>."
+#~ msgstr ""
+#~ "Apple может <a 
href=\"https://www.macrumors.com/2019/06/03/apples-new-";
+#~ "find-my-app/\"> отслежвать ай-чудищ, даже когда 
они в спящем режиме</a>."
+
+#~ msgid ""
+#~ "This distributed bluetooth network is said to be &ldquo;secure,&rdquo; "
+#~ "but it is obviously <em>not</em> secure from Apple or from governments "
+#~ "that can command Apple's obedience (such as the US and China)."
+#~ msgstr ""
+#~ "Говорят, что эта распределенная сеть 
Bluetooth &ldquo;защищена&rdquo;, но "
+#~ "она с очевидностью <em>не</em> защищена от 
Apple или правящих режимов, "
+#~ "которые могут подчинить себе Apple (таких 
как США и Китай)."
+
+#~ msgid ""
 #~ "This may have improved with <a href=\"http://www.washingtonpost.com/";
 #~ "business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story."
 #~ "html\"> iOS 8 security improvements</a>; but <a href=\"https://firstlook.";

Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- po/zh-tw.po 30 Jun 2019 08:29:21 -0000      1.103
+++ po/zh-tw.po 10 Jul 2019 13:00:26 -0000      1.104
@@ -1098,19 +1098,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-";
-"app/\"> track iMonsters even when they are suspended</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This distributed bluetooth network is said to be &ldquo;secure,&rdquo; but "
-"it is obviously <em>not</em> secure from Apple or from governments that can "
-"command Apple's obedience (such as the US and China)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]