www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-games.ru.html proprieta...


From: GNUN
Subject: www/proprietary malware-games.ru.html proprieta...
Date: Mon, 15 Jul 2019 06:02:27 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/07/15 06:02:26

Modified files:
        proprietary    : malware-games.ru.html 
                         proprietary-addictions.ru.html 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-games.ru-en.html malware-games.ru.po 
                         malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.ru.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-addictions.ru-en.html 
                         proprietary-addictions.ru.po 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.ru.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.ru.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru-en.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.452&r2=1.453
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.312&r2=1.313
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.546&r2=1.547
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.258&r2=1.259
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.106&r2=1.107

Patches:
Index: malware-games.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.ru.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- malware-games.ru.html       30 Jun 2019 08:58:55 -0000      1.30
+++ malware-games.ru.html       15 Jul 2019 10:02:16 -0000      1.31
@@ -120,6 +120,19 @@
 &ldquo;бесплатный&rdquo;.</p>
   </li>
 
+  <li id="M201809210">
+    <p>Cash of Clans&nbsp;&mdash; хороший пример 
бесплатной мобильной игры, которую
+ее разработчики сделали <a
+href="https://gamerant.com/clash-of-clans-addiction/";> вызывающей 
сильную
+зависимость</a> у большой доли 
пользователей&nbsp;&mdash; и превратили в
+автомат, производящий деньги для 
разработчиков, с помощью <a
+href="/proprietary/proprietary-addictions.html#addictiveness"> приемов
+психологической манипуляции</a>.</p>
+
+    <p>В статье слово &ldquo;свободный&rdquo; 
используется в смысле нулевой
+цены. Мы рекомендуем вместо этого говорить 
&ldquo;бесплатный&rdquo;.</p>
+  </li>
+
   <li id="M201807310">
     <p>Несвободная видеоигра, доступная 
через несвободный клиент Steam, <a
 
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
@@ -390,7 +403,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/06/30 08:58:55 $
+$Date: 2019/07/15 10:02:16 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-addictions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.ru.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-addictions.ru.html      30 Jun 2019 08:58:55 -0000      1.11
+++ proprietary-addictions.ru.html      15 Jul 2019 10:02:16 -0000      1.12
@@ -132,6 +132,19 @@
 выработки зависимости так, что 
пользователи ничего бы не теряли.</p>
   </li>
 
+  <li id="M201809210">
+    <p>Cash of Clans&nbsp;&mdash; хороший пример 
бесплатной мобильной игры, которую
+ее разработчики сделали <a
+href="https://gamerant.com/clash-of-clans-addiction/";> вызывающей 
сильную
+зависимость</a> у большой доли 
пользователей&nbsp;&mdash; и превратили в
+автомат, производящий деньги для 
разработчиков, с помощью <a
+href="/proprietary/proprietary-addictions.html#addictiveness"> приемов
+психологической манипуляции</a>.</p>
+
+    <p>В статье слово &ldquo;свободный&rdquo; 
используется в смысле нулевой
+цены. Мы рекомендуем вместо этого говорить 
&ldquo;бесплатный&rdquo;.</p>
+  </li>
+
   <li id="M201612290">
     <p>В игре Fruit Pop игрок покупает силы за 
монеты, чтобы набрать больше
 очков. Игрок получает монеты в конце 
каждой игры и может покупать их
@@ -241,7 +254,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/06/30 08:58:55 $
+$Date: 2019/07/15 10:02:16 $
 
 <!-- timestamp end -->
 </p>

Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- po/de.po    15 Jul 2019 09:30:56 -0000      1.107
+++ po/de.po    15 Jul 2019 10:02:17 -0000      1.108
@@ -5501,6 +5501,20 @@
 msgid "Google Insecurity"
 msgstr "Unsicherheit"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 # | Google [-Surveillance-] {+Interference+}
 #, fuzzy

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- po/es.po    15 Jul 2019 09:30:56 -0000      1.144
+++ po/es.po    15 Jul 2019 10:02:18 -0000      1.145
@@ -4294,6 +4294,20 @@
 msgid "Google Insecurity"
 msgstr "Inseguridad en los móviles"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 # | [-Mobile Surveillance-]{+Google Interference+}
 #, fuzzy

Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- po/fr.po    15 Jul 2019 09:30:56 -0000      1.186
+++ po/fr.po    15 Jul 2019 10:02:18 -0000      1.187
@@ -4528,6 +4528,20 @@
 msgid "Google Insecurity"
 msgstr "Insécurité"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 msgid "Google Interference"
 msgstr "Ingérence"

Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- po/it.po    15 Jul 2019 09:30:56 -0000      1.107
+++ po/it.po    15 Jul 2019 10:02:18 -0000      1.108
@@ -5173,6 +5173,20 @@
 msgid "Google Insecurity"
 msgstr "Scarsa sicurezza in dispositivi mobili"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 # | [-Mobile Surveillance-]{+Google Interference+}
 #, fuzzy

Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- po/ja.po    15 Jul 2019 09:30:56 -0000      1.113
+++ po/ja.po    15 Jul 2019 10:02:18 -0000      1.114
@@ -3940,6 +3940,20 @@
 msgid "Google Insecurity"
 msgstr "Googleの危険性"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 #, fuzzy
 msgid "Google Interference"

Index: po/malware-games.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/malware-games.ru-en.html 30 Jun 2019 08:58:55 -0000      1.29
+++ po/malware-games.ru-en.html 15 Jul 2019 10:02:19 -0000      1.30
@@ -116,6 +116,19 @@
     instead.</p>
   </li>
 
+  <li id="M201809210">
+    <p>Cash of Clans is a good example of a gratis mobile game that its
+    developers <a href="https://gamerant.com/clash-of-clans-addiction/";>
+    made very addictive</a> for a large proportion of its users&mdash;and
+    turned into a cash machine for themselves&mdash;by using <a
+    href="/proprietary/proprietary-addictions.html#addictiveness">
+    psychological manipulation techniques</a>.</p>
+
+    <p>The article uses &ldquo;free&rdquo; to mean &ldquo;zero
+    price,&rdquo; which is a usage we should avoid. We recommend saying
+    &ldquo;gratis&rdquo; instead.</p>
+  </li>
+
   <li id="M201807310">
     <p>A nonfree video game, available through the nonfree Steam client, <a
     
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
@@ -360,7 +373,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/30 08:58:55 $
+$Date: 2019/07/15 10:02:19 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- po/malware-games.ru.po      15 Jul 2019 09:30:56 -0000      1.63
+++ po/malware-games.ru.po      15 Jul 2019 10:02:20 -0000      1.64
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-07-15 09:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -242,22 +241,20 @@
 "proprietary-addictions.html#addictiveness\"> psychological manipulation "
 "techniques</a>."
 msgstr ""
+"Cash of Clans&nbsp;&mdash; хороший пример бесплатной 
мобильной игры, которую "
+"ее разработчики сделали <a 
href=\"https://gamerant.com/clash-of-clans-";
+"addiction/\"> вызывающей сильную зависимость</a> 
у большой доли "
+"пользователей&nbsp;&mdash; и превратили в 
автомат, производящий деньги для "
+"разработчиков, с помощью <a 
href=\"/proprietary/proprietary-addictions."
+"html#addictiveness\"> приемов психологической 
манипуляции</a>."
 
 #. type: Content of: <ul><li><p>
-# | [-Unfortunately, the-]{+The+} article uses &ldquo;free&rdquo; to mean
-# | &ldquo;zero [-price.&rdquo;-] {+price,&rdquo; which is a usage we should
-# | avoid.+} We recommend saying &ldquo;gratis&rdquo; instead.
-#, fuzzy
-#| msgid ""
-#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
-#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
 msgid ""
 "The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
 "is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
-"К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в значении "
-"&ldquo;нулевой цены&rdquo;. Мы рекомендуем 
вместо этого говорить &ldquo;"
-"бесплатный&rdquo;."
+"В статье слово &ldquo;свободный&rdquo; 
используется в смысле нулевой цены. "
+"Мы рекомендуем вместо этого говорить 
&ldquo;бесплатный&rdquo;."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: po/malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/malware-google.de-diff.html      13 Jul 2019 18:01:17 -0000      1.28
+++ po/malware-google.de-diff.html      15 Jul 2019 10:02:20 -0000      1.29
@@ -228,29 +228,38 @@
   bugs.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+      The NSA</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps</em></ins></span> can <span 
class="removed"><del><strong>tap data</strong></del></span> <span 
class="inserted"><ins><em>track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>smart phones, 
including</strong></del></span> <span class="inserted"><ins><em>Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</em></ins></span>
-    The NSA can tap data in smart phones, including iPhones,
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+    The NSA can tap data in smart phones, including</em></ins></span> iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
     detail here, it seems that this does not operate via
     the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
     lots of bugs in the phones' radio <span 
class="removed"><del><strong>software&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>software&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="sabotage"&gt;Google 
Sabotage&lt;/h3&gt;
-
-&lt;p&gt;The wrongs in this</strong></del></span> <span 
class="inserted"><ins><em>id="interference"&gt;Google Interference&lt;/h3&gt;
+&lt;h3 id="interference"&gt;Google Interference&lt;/h3&gt;
 
-&lt;p&gt;This</em></ins></span> section <span class="inserted"><ins><em>gives 
examples of Google software harassing or annoying
-the user, or causing trouble for the user.  These actions</em></ins></span> 
are <span class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>like
+&lt;p&gt;This section gives examples of Google software harassing or annoying
+the user, or causing trouble for the user.  These actions are like
 sabotage but the word &ldquo;sabotage&rdquo; is too strong for them.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
@@ -261,13 +270,13 @@
     contains&lt;/a&gt;. Users could conceivably reverse the change in a fork
     of Chromium, but surely Chrome (nonfree) will have the same change,
     and users can't fix it there.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
 &lt;h3 id="sabotage"&gt;Google Sabotage&lt;/h3&gt;
 
-&lt;p&gt;The wrongs in this section are not</em></ins></span> precisely 
malware, since they do
+&lt;p&gt;The wrongs in this section are not precisely malware, since they do
 not involve making the program that runs in a way that hurts the user.
 But they are a lot like malware, since they are technical Google
 actions that harm <span class="removed"><del><strong>to</strong></del></span> 
the users of specific Google software.&lt;/p&gt;
@@ -630,7 +639,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/13 18:01:17 $
+$Date: 2019/07/15 10:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- po/malware-google.de.po     13 Jul 2019 18:01:17 -0000      1.43
+++ po/malware-google.de.po     15 Jul 2019 10:02:20 -0000      1.44
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-13 17:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -455,6 +455,20 @@
 "schwerwiegenden Fehler hat."
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | <a
 # | 
[-href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\";>-]
 # | 
{+href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\";>+}

Index: po/malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-google.es.po     14 Jul 2019 10:30:35 -0000      1.13
+++ po/malware-google.es.po     15 Jul 2019 10:02:20 -0000      1.14
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-14 12:16+0200\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2019-07-14 12:28+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-15 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -347,6 +348,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/";
 "international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
 "html\"> The NSA can tap data in smart phones, including iPhones, Android, "

Index: po/malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- po/malware-google.fr.po     13 Jul 2019 18:03:57 -0000      1.71
+++ po/malware-google.fr.po     15 Jul 2019 10:02:20 -0000      1.72
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-13 17:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2019-07-13 20:03+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-15 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -349,6 +350,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/";
 "international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
 "html\"> The NSA can tap data in smart phones, including iPhones, Android, "

Index: po/malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- po/malware-google.pot       13 Jul 2019 18:01:17 -0000      1.39
+++ po/malware-google.pot       15 Jul 2019 10:02:20 -0000      1.40
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-13 17:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -258,6 +258,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a "
+"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\";>
 "
+"not to allow them access to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a "
 
"href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\";>
 "
 "The NSA can tap data in smart phones, including iPhones, Android, and "

Index: po/malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- po/malware-google.ru.po     13 Jul 2019 19:29:10 -0000      1.91
+++ po/malware-google.ru.po     15 Jul 2019 10:02:20 -0000      1.92
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-13 17:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2018-10-05 09:03+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-15 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -349,6 +350,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/";
 "international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
 "html\"> The NSA can tap data in smart phones, including iPhones, Android, "

Index: po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/malware-mobiles.de-diff.html     27 Jun 2019 08:02:21 -0000      1.59
+++ po/malware-mobiles.de-diff.html     15 Jul 2019 10:02:20 -0000      1.60
@@ -480,6 +480,16 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night &lt;a
@@ -892,9 +902,8 @@
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5</strong></del></span>
       <span class="inserted"><ins><em>five</em></ins></span> tracking 
libraries. Developers of this app have confirmed that
-      the non-premium version of the app <span 
class="removed"><del><strong>does
-      JavaScript injection</strong></del></span> <span 
class="inserted"><ins><em>does JavaScript injection for
-      tracking the user and displaying ads.&lt;/dd&gt;
+      the non-premium version of the app does JavaScript injection for <span 
class="removed"><del><strong>tracking</strong></del></span>
+      <span class="inserted"><ins><em>tracking the user and displaying 
ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
@@ -907,7 +916,7 @@
   &lt;li id="M201606050"&gt;
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans your mobile phone's photo collections</em></ins></span> for <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>known faces&lt;/a&gt;,</em></ins></span>
+    scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</em></ins></span>
     and <span class="removed"><del><strong>display ads.&lt;/dd&gt;
   &lt;/dl&gt;
 &lt;/li&gt;
@@ -1367,7 +1376,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 08:02:21 $
+$Date: 2019/07/15 10:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- po/malware-mobiles.de.po    27 Jun 2019 08:02:21 -0000      1.116
+++ po/malware-mobiles.de.po    15 Jul 2019 10:02:20 -0000      1.117
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -859,6 +859,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- po/malware-mobiles.es.po    1 Jul 2019 09:05:07 -0000       1.134
+++ po/malware-mobiles.es.po    15 Jul 2019 10:02:20 -0000      1.135
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-15 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -717,6 +718,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- po/malware-mobiles.fr.po    27 Jun 2019 09:14:42 -0000      1.160
+++ po/malware-mobiles.fr.po    15 Jul 2019 10:02:20 -0000      1.161
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2019-06-27 11:13+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-15 09:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -715,6 +716,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/malware-mobiles.it-diff.html     27 Jun 2019 08:02:21 -0000      1.64
+++ po/malware-mobiles.it-diff.html     15 Jul 2019 10:02:20 -0000      1.65
@@ -530,6 +530,16 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night &lt;a
@@ -1410,7 +1420,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 08:02:21 $
+$Date: 2019/07/15 10:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- po/malware-mobiles.it.po    27 Jun 2019 08:02:21 -0000      1.116
+++ po/malware-mobiles.it.po    15 Jul 2019 10:02:20 -0000      1.117
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -810,6 +810,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- po/malware-mobiles.ja-diff.html     27 Jun 2019 08:02:21 -0000      1.80
+++ po/malware-mobiles.ja-diff.html     15 Jul 2019 10:02:20 -0000      1.81
@@ -490,6 +490,16 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night &lt;a
@@ -1252,7 +1262,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 08:02:21 $
+$Date: 2019/07/15 10:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- po/malware-mobiles.ja.po    27 Jun 2019 08:02:21 -0000      1.106
+++ po/malware-mobiles.ja.po    15 Jul 2019 10:02:20 -0000      1.107
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -608,6 +608,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- po/malware-mobiles.pot      27 Jun 2019 08:02:21 -0000      1.82
+++ po/malware-mobiles.pot      15 Jul 2019 10:02:20 -0000      1.83
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -487,6 +487,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a "
+"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\";>
 "
+"not to allow them access to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a "
 
"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\";>
 "

Index: po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- po/malware-mobiles.ru.po    27 Jun 2019 14:00:28 -0000      1.194
+++ po/malware-mobiles.ru.po    15 Jul 2019 10:02:20 -0000      1.195
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-15 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -706,6 +707,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
 "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"

Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- po/nl.po    15 Jul 2019 09:30:56 -0000      1.107
+++ po/nl.po    15 Jul 2019 10:02:20 -0000      1.108
@@ -3720,6 +3720,20 @@
 msgid "Google Insecurity"
 msgstr "Apple-onveiligheid"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 # | [-Apple-]{+Google+} Interference
 #, fuzzy

Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- po/pl.po    15 Jul 2019 09:30:56 -0000      1.107
+++ po/pl.po    15 Jul 2019 10:02:21 -0000      1.108
@@ -3216,6 +3216,20 @@
 msgid "Google Insecurity"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 msgid "Google Interference"
 msgstr ""

Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- po/pot      15 Jul 2019 09:30:56 -0000      1.106
+++ po/pot      15 Jul 2019 10:02:22 -0000      1.107
@@ -3026,6 +3026,20 @@
 msgid "Google Insecurity"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 msgid "Google Interference"
 msgstr ""

Index: po/proprietary-addictions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/proprietary-addictions.ru-en.html        30 Jun 2019 08:58:55 -0000      
1.10
+++ po/proprietary-addictions.ru-en.html        15 Jul 2019 10:02:22 -0000      
1.11
@@ -127,6 +127,19 @@
     addictive behaviors without losing the user anything.</p>
   </li>
 
+  <li id="M201809210">
+    <p>Cash of Clans is a good example of a gratis mobile game that its
+    developers <a href="https://gamerant.com/clash-of-clans-addiction/";>
+    made very addictive</a> for a large proportion of its users&mdash;and
+    turned into a cash machine for themselves&mdash;by using <a
+    href="/proprietary/proprietary-addictions.html#addictiveness">
+    psychological manipulation techniques</a>.</p>
+
+    <p>The article uses &ldquo;free&rdquo; to mean &ldquo;zero
+    price,&rdquo; which is a usage we should avoid. We recommend saying
+    &ldquo;gratis&rdquo; instead.</p>
+  </li>
+
   <li id="M201612290">
     <p>In the game Fruit Pop, the player buys boosts with coins to get
     a high score. The player gets coins at the end of each game, and can
@@ -216,7 +229,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/30 08:58:55 $
+$Date: 2019/07/15 10:02:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-addictions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/proprietary-addictions.ru.po     15 Jul 2019 09:30:56 -0000      1.23
+++ po/proprietary-addictions.ru.po     15 Jul 2019 10:02:22 -0000      1.24
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-07-15 09:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -274,22 +273,20 @@
 "proprietary-addictions.html#addictiveness\"> psychological manipulation "
 "techniques</a>."
 msgstr ""
+"Cash of Clans&nbsp;&mdash; хороший пример бесплатной 
мобильной игры, которую "
+"ее разработчики сделали <a 
href=\"https://gamerant.com/clash-of-clans-";
+"addiction/\"> вызывающей сильную зависимость</a> 
у большой доли "
+"пользователей&nbsp;&mdash; и превратили в 
автомат, производящий деньги для "
+"разработчиков, с помощью <a 
href=\"/proprietary/proprietary-addictions."
+"html#addictiveness\"> приемов психологической 
манипуляции</a>."
 
 #. type: Content of: <ul><li><p>
-# | [-Unfortunately, the-]{+The+} article uses &ldquo;free&rdquo; to mean
-# | &ldquo;zero [-price.&rdquo;-] {+price,&rdquo; which is a usage we should
-# | avoid.+} We recommend saying &ldquo;gratis&rdquo; instead.
-#, fuzzy
-#| msgid ""
-#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
-#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
 msgid ""
 "The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
 "is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
-"К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в значении "
-"&ldquo;нулевой цены&rdquo;. Мы рекомендуем 
вместо этого говорить &ldquo;"
-"бесплатный&rdquo;."
+"В статье слово &ldquo;свободный&rdquo; 
используется в смысле нулевой цены. "
+"Мы рекомендуем вместо этого говорить 
&ldquo;бесплатный&rdquo;."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- po/proprietary-insecurity.de-diff.html      18 May 2019 08:29:45 -0000      
1.27
+++ po/proprietary-insecurity.de-diff.html      15 Jul 2019 10:02:22 -0000      
1.28
@@ -63,23 +63,32 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to <span class="removed"><del><strong>present the specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;
-  &lt;p&gt;Some Samsung phones
-    randomly &lt;a 
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos to people</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
+to <span class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught</em></ins></span> in the <span 
class="removed"><del><strong>owner's contact list&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;ul&gt;
 &lt;li&gt;
-  &lt;p&gt;One of the dangers</strong></del></span> <span 
class="inserted"><ins><em>jail</em></ins></span> of <span 
class="inserted"><ins><em>an iMonster are &lt;a
+  &lt;p&gt;Some Samsung phones
+    randomly</strong></del></span> <span class="inserted"><ins><em>user 
says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
+    photos</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not</em></ins></span> to <span 
class="removed"><del><strong>people</strong></del></span> <span 
class="inserted"><ins><em>allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>the owner's 
contact list&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;One of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905150"&gt;
+    &lt;p&gt;Users caught in</em></ins></span> the <span 
class="removed"><del><strong>dangers</strong></del></span> <span 
class="inserted"><ins><em>jail</em></ins></span> of <span 
class="inserted"><ins><em>an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
     ducks for other attackers&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;internet</strong></del></span> <span 
class="inserted"><ins><em>app censorship prevents security
     companies from figuring out how those attacks work.&lt;/p&gt;
@@ -121,21 +130,20 @@
     developers to fix bugs in their products.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump</strong></del></span>
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
+    hospitals</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera is</em></ins></span> 
designed <span class="removed"><del><strong>for
-    hospitals</strong></del></span> <span class="inserted"><ins><em>so that the
-    manufacturer (now Amazon) can watch all the time. Now it turns out
-    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera</em></ins></span> is <span 
class="removed"><del><strong>connected to</strong></del></span> <span 
class="inserted"><ins><em>designed so that</em></ins></span> the <span 
class="removed"><del><strong>internet. Naturally</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch all 
the time. Now it turns out
+    that</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The third party vulnerability</em></ins></span> is <span 
class="removed"><del><strong>connected</strong></del></span> <span 
class="inserted"><ins><em>presumably
+    &lt;p&gt;The third party vulnerability is presumably
     unintentional and I suppose Amazon will fix it. I
-    do not expect Amazon</em></ins></span> to <span 
class="inserted"><ins><em>change</em></ins></span> the <span 
class="removed"><del><strong>internet. Naturally</strong></del></span> <span 
class="inserted"><ins><em>design that</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
-    its</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -206,8 +214,8 @@
   &lt;li id="M201709200"&gt;
     &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
     designed for hospitals is connected to the internet. Naturally &lt;a
-    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
-    its</em></ins></span> security has been cracked&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;</em></ins></span>
+    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Note that this article misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
@@ -1019,7 +1027,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/07/15 10:02:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- po/proprietary-insecurity.de.po     18 May 2019 08:29:45 -0000      1.130
+++ po/proprietary-insecurity.de.po     15 Jul 2019 10:02:22 -0000      1.131
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -139,6 +139,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "

Index: po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- po/proprietary-insecurity.fr.po     18 May 2019 12:25:57 -0000      1.166
+++ po/proprietary-insecurity.fr.po     15 Jul 2019 10:02:22 -0000      1.167
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2019-05-18 14:23+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-15 09:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -110,6 +111,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "

Index: po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- po/proprietary-insecurity.it-diff.html      18 May 2019 08:29:45 -0000      
1.42
+++ po/proprietary-insecurity.it-diff.html      15 Jul 2019 10:02:22 -0000      
1.43
@@ -58,97 +58,114 @@
 &lt;li id="break-security-smarttv"&gt;
   &lt;p&gt;&lt;a
        
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-      Crackers found a way</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;This page lists clearly established 
cases of insecurity in
-proprietary software that has grave consequences or is otherwise
-noteworthy.&lt;/p&gt;
-
-&lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought</em></ins></span> to <span 
class="removed"><del><strong>break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera</strong></del></span> <span 
class="inserted"><ins><em>be in this page but isn't
-here, please write</em></ins></span>
-to <span class="removed"><del><strong>watch</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>people who are watching TV.&lt;/p&gt;
+      Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
+      to watch the people who are watching TV.&lt;/p&gt;
 &lt;/li&gt;
 &lt;li&gt;
-  &lt;p&gt;Many models</strong></del></span> <span 
class="inserted"><ins><em>URL</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras &lt;a
+  &lt;p&gt;Many models</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;This page lists clearly established 
cases</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras &lt;a
   href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
   have backdoors&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;That is</strong></del></span> a <span 
class="removed"><del><strong>malicious functionality, but</strong></del></span> 
<span class="inserted"><ins><em>trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;
+  &lt;p&gt;That is a malicious functionality, but</strong></del></span> <span 
class="inserted"><ins><em>insecurity</em></ins></span> in <span 
class="removed"><del><strong>addition it</strong></del></span>
+<span class="inserted"><ins><em>proprietary software that has grave 
consequences or</em></ins></span> is <span class="removed"><del><strong>a gross
+  insecurity since anyone, including malicious crackers, &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find those accounts and use them to get into
+  users' cameras&lt;/a&gt;.&lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;
+    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+    pre-installed on 28 models</strong></del></span> <span 
class="inserted"><ins><em>otherwise
+noteworthy.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>HP laptops logged the user's
+    keystroke</strong></del></span> <span class="inserted"><ins><em>an example 
that ought</em></ins></span> to <span class="removed"><del><strong>a 
file</strong></del></span> <span class="inserted"><ins><em>be</em></ins></span> 
in <span class="removed"><del><strong>the filesystem. Any process with 
access</strong></del></span> <span class="inserted"><ins><em>this page but isn't
+here, please write</em></ins></span>
+to <span class="inserted"><ins><em>&lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>filesystem</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference</em></ins></span> or 
<span class="removed"><del><strong>the MapViewOfFile API could gain 
access</strong></del></span> <span 
class="inserted"><ins><em>two</em></ins></span>
+to <span class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when</em></ins></span> the
+    <span class="removed"><del><strong>log. Furthermore,</strong></del></span> 
<span class="inserted"><ins><em>user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not</em></ins></span> to <span 
class="removed"><del><strong>modzero&lt;/a&gt; the &ldquo;information-leak via 
Covert Storage
+    Channel enables malware authors</strong></del></span> <span 
class="inserted"><ins><em>allow them access</em></ins></span> to <span 
class="removed"><del><strong>capture keystrokes without
+    taking</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught</em></ins></span> in <span 
class="removed"><del><strong>addition it is a gross
-  insecurity since anyone, including malicious crackers,</strong></del></span> 
<span class="inserted"><ins><em>the jail of an iMonster are</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html"&gt;
 sitting
+    &lt;p&gt;Users caught in</em></ins></span> the <span 
class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>jail</em></ins></span> of <span 
class="removed"><del><strong>being classified</strong></del></span> <span 
class="inserted"><ins><em>an iMonster are &lt;a
+    href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
-    companies from figuring out how</em></ins></span> those <span 
class="removed"><del><strong>accounts</strong></del></span> <span 
class="inserted"><ins><em>attacks work.&lt;/p&gt;
+    companies from figuring out how those attacks work.&lt;/p&gt;
 
-    &lt;p&gt;Apple's censorship of apps is fundamentally 
unjust,</em></ins></span> and <span class="removed"><del><strong>use 
them</strong></del></span> <span class="inserted"><ins><em>would be
-    inexcusable even if it didn't lead</em></ins></span> to <span 
class="removed"><del><strong>get into
-  users' cameras&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>security threats as well.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
+    inexcusable even if it didn't lead to security threats</em></ins></span> 
as <span class="removed"><del><strong>malicious task by AV
+    heuristics&rdquo;.
+  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;
-    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
-    pre-installed on 28</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>proprietary 
code</strong></del></span> <span class="inserted"><ins><em>Medtronics Conexus 
Telemetry Protocol has &lt;a
     
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several</em></ins></span> models of <span 
class="removed"><del><strong>HP laptops logged</strong></del></span> <span 
class="inserted"><ins><em>implantable
-    defibrillators&lt;/a&gt; and</em></ins></span> the <span 
class="removed"><del><strong>user's
-    keystroke to a file</strong></del></span> <span 
class="inserted"><ins><em>devices they connect to.&lt;/p&gt;
+    two vulnerabilities</em></ins></span> that <span 
class="removed"><del><strong>runs pacemakers, insulin 
pumps,</strong></del></span> <span class="inserted"><ins><em>affect several 
models of implantable
+    defibrillators&lt;/a&gt;</em></ins></span> and <span 
class="removed"><del><strong>other
+medical</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> devices <span 
class="removed"><del><strong>is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
     vulnerabilities were discovered in an earlier Medtronics communication
-    protocol</em></ins></span> in <span class="inserted"><ins><em>2008. 
Apparently, nothing was done by</em></ins></span> the <span 
class="removed"><del><strong>filesystem. Any process with 
access</strong></del></span> <span class="inserted"><ins><em>company to
+    protocol in 2008. Apparently, nothing was done by the company to
     correct them. This means you can't rely on proprietary software
-    developers</em></ins></span> to <span class="inserted"><ins><em>fix bugs 
in their products.&lt;/p&gt;
+    developers to fix bugs in their products.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so 
that</em></ins></span> the <span class="removed"><del><strong>filesystem 
or</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch 
all</em></ins></span> the <span class="removed"><del><strong>MapViewOfFile API 
could gain access</strong></del></span> <span class="inserted"><ins><em>time. 
Now it turns out
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Exploits</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
     that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
     unintentional and I suppose Amazon will fix it. I
-    do not expect Amazon</em></ins></span> to <span 
class="inserted"><ins><em>change</em></ins></span> the
-    <span class="removed"><del><strong>log. Furthermore,</strong></del></span> 
<span class="inserted"><ins><em>design that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
-    Amazon</em></ins></span> to <span 
class="removed"><del><strong>modzero&lt;/a&gt; the &ldquo;information-leak via 
Covert Storage
-    Channel enables malware authors</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.&lt;/p&gt;
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how</em></ins></span> to <span 
class="removed"><del><strong>capture keystrokes without
-    taking</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
     hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
     them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break</em></ins></span> the <span 
class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>security</em></ins></span> of <span 
class="removed"><del><strong>being classified</strong></del></span> <span 
class="inserted"><ins><em>an Amazon device,
+    &lt;p&gt;Crackers found a way to break the security</em></ins></span> of 
<span class="removed"><del><strong>bugs</strong></del></span> <span 
class="inserted"><ins><em>an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such</em></ins></span> as <span 
class="removed"><del><strong>malicious task by AV
-    heuristics&rdquo;.
-  &lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;The proprietary code</strong></del></span> <span 
class="inserted"><ins><em>China or the US
-    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>runs pacemakers, insulin 
pumps,</strong></del></span> <span class="inserted"><ins><em>country,
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product</em></ins></span> in 
<span class="removed"><del><strong>Windows, which were 
developed</strong></del></span> <span class="inserted"><ins><em>that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;These crackers are probably hackers too, but please &lt;a
@@ -157,25 +174,23 @@
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa,</em></ins></span> and <span 
class="inserted"><ins><em>all the</em></ins></span> other
-<span class="removed"><del><strong>medical devices</strong></del></span> <span 
class="inserted"><ins><em>voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
-    hijacked by programs that play commands in ultrasound that humans
+    hijacked</em></ins></span> by <span class="inserted"><ins><em>programs 
that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807020"&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
+    photos to people in</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>owner's contact list&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712240"&gt;
-    &lt;p&gt;One of the dangers of the &ldquo;internet of 
stings&rdquo;</em></ins></span>
-    is <span class="inserted"><ins><em>that, if you lose your internet 
service, you also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control</em></ins></span> of <span 
class="removed"><del><strong>gross</strong></del></span> <span 
class="inserted"><ins><em>your house and appliances&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;One of the dangers of the &ldquo;internet of stings&rdquo;
+    is that, if you lose your internet service, you also &lt;a
+    
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
+    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For your safety, don't use any appliance with a connection to the
     real internet.&lt;/p&gt;
@@ -191,17 +206,13 @@
     &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
     allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system has a grave</em></ins></span> security <span 
class="removed"><del><strong>faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>flaw.&lt;/p&gt;</em></ins></span>
+    it, the system has a grave security flaw.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Exploits of bugs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709290"&gt;
-    &lt;p&gt;Bad security</em></ins></span> in <span 
class="removed"><del><strong>Windows, which were developed 
by</strong></del></span> <span class="inserted"><ins><em>some cars makes it 
possible to &lt;a
+  &lt;li id="M201709290"&gt;
+    &lt;p&gt;Bad security in some cars makes it possible to &lt;a
     href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
-    remotely activate</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>airbags&lt;/a&gt;.&lt;/p&gt;
+    remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709200"&gt;
@@ -976,7 +987,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/07/15 10:02:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- po/proprietary-insecurity.it.po     18 May 2019 08:29:45 -0000      1.147
+++ po/proprietary-insecurity.it.po     15 Jul 2019 10:02:22 -0000      1.148
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -132,6 +132,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "

Index: po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- po/proprietary-insecurity.ja-diff.html      26 Jun 2019 20:32:27 -0000      
1.61
+++ po/proprietary-insecurity.ja-diff.html      15 Jul 2019 10:02:23 -0000      
1.62
@@ -84,48 +84,60 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw</strong></del></span>
 <span class="inserted"><ins><em>trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;
+&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in
+Internet Explorer and Edge&lt;/a&gt; allows an attacker</strong></del></span> 
<span class="inserted"><ins><em>trustworthy reference or two</em></ins></span>
+to <span class="removed"><del><strong>retrieve
+Microsoft account credentials, if</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught</em></ins></span> in
-<span class="removed"><del><strong>Internet Explorer and Edge&lt;/a&gt; 
allows</strong></del></span> <span class="inserted"><ins><em>the jail 
of</em></ins></span> an <span class="removed"><del><strong>attacker to retrieve
-Microsoft account credentials, if</strong></del></span> <span 
class="inserted"><ins><em>iMonster are &lt;a
-    href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
-    ducks for other attackers&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>app censorship prevents security
-    companies from figuring out how those attacks work.&lt;/p&gt;
-
-    &lt;p&gt;Apple's censorship of apps</em></ins></span> is <span 
class="removed"><del><strong>tricked into visiting a
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when</em></ins></span> the user <span 
class="removed"><del><strong>is tricked into visiting a
 malicious link.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
-WhatsApp messages are not entirely deleted&lt;/a&gt;. They 
can</strong></del></span> <span class="inserted"><ins><em>fundamentally unjust, 
and would</em></ins></span> be <span class="removed"><del><strong>recovered
-in various ways.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>inexcusable even if it didn't lead to 
security threats as well.&lt;/p&gt;</em></ins></span>
+WhatsApp messages are</strong></del></span> <span 
class="inserted"><ins><em>says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;</em></ins></span>
+    not <span class="removed"><del><strong>entirely deleted&lt;/a&gt;. They 
can be recovered</strong></del></span> <span class="inserted"><ins><em>to allow 
them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>various ways.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;A vulnerability</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905150"&gt;
+    &lt;p&gt;Users caught</em></ins></span> in <span 
class="removed"><del><strong>Apple's Image I/O API 
allowed</strong></del></span> <span class="inserted"><ins><em>the jail 
of</em></ins></span> an <span class="removed"><del><strong>attacker 
to</strong></del></span> <span class="inserted"><ins><em>iMonster 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+  malacious code</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html"&gt;
 sitting
+    ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
+    companies</em></ins></span> from <span class="removed"><del><strong>any 
application which uses this API to render a
+  certain kind</strong></del></span> <span class="inserted"><ins><em>figuring 
out how those attacks work.&lt;/p&gt;
+
+    &lt;p&gt;Apple's censorship</em></ins></span> of <span 
class="removed"><del><strong>image file&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;A bug in a proprietary ASN.1 library,</strong></del></span> <span 
class="inserted"><ins><em>apps is fundamentally unjust, and would be
+    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903210"&gt;
     &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
     
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
     two vulnerabilities that affect several models of implantable
     defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered</em></ins></span> in <span 
class="removed"><del><strong>Apple's Image I/O API 
allowed</strong></del></span> an <span class="removed"><del><strong>attacker to
-&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-  malacious code from any application which uses this 
API</strong></del></span> <span class="inserted"><ins><em>earlier Medtronics 
communication
-    protocol in 2008. Apparently, nothing was done by the 
company</em></ins></span> to <span class="removed"><del><strong>render 
a</strong></del></span>
-    <span class="inserted"><ins><em>correct them. This means you can't rely on 
proprietary software
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
     developers to fix bugs in their products.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -401,13 +413,12 @@
   &lt;li id="M201607220"&gt;
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code from any application which uses this API to render 
a</em></ins></span>
+    malicious code from any application which uses this API to render a
     certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;</em></ins></span>
-    &lt;p&gt;A bug in a proprietary ASN.1 library, used
+  &lt;li id="M201607190"&gt;
+    &lt;p&gt;A bug in a proprietary ASN.1 library,</em></ins></span> used
     in cell phone towers as well as cell phones and routers, &lt;a
     
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
     taking control of those systems&lt;/a&gt;.&lt;/p&gt;
@@ -922,7 +933,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/26 20:32:27 $
+$Date: 2019/07/15 10:02:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- po/proprietary-insecurity.ja.po     26 Jun 2019 09:01:19 -0000      1.119
+++ po/proprietary-insecurity.ja.po     15 Jul 2019 10:02:23 -0000      1.120
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -106,6 +106,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "

Index: po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- po/proprietary-insecurity.pot       18 May 2019 08:29:45 -0000      1.86
+++ po/proprietary-insecurity.pot       15 Jul 2019 10:02:23 -0000      1.87
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a "
+"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\";>
 "
+"not to allow them access to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a "
 "href=\"https://boingboing.net/2019/05/15/brittle-security.html\";> sitting "
 "ducks for other attackers</a>, and the app censorship prevents security "

Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- po/proprietary-insecurity.ru.po     18 May 2019 08:59:41 -0000      1.219
+++ po/proprietary-insecurity.ru.po     15 Jul 2019 10:02:23 -0000      1.220
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2018-12-02 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-15 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Users caught in the jail of an iMonster are <a href=\"https://boingboing.";
 "net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
 "a>, and the app censorship prevents security companies from figuring out how "

Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- po/proprietary-surveillance.de-diff.html    13 Jul 2019 18:01:18 -0000      
1.84
+++ po/proprietary-surveillance.de-diff.html    15 Jul 2019 10:02:23 -0000      
1.85
@@ -1101,6 +1101,16 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -3500,7 +3510,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/13 18:01:18 $
+$Date: 2019/07/15 10:02:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- po/proprietary-surveillance.de.po   13 Jul 2019 18:01:18 -0000      1.299
+++ po/proprietary-surveillance.de.po   15 Jul 2019 10:02:24 -0000      1.300
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-13 17:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1953,6 +1953,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.452
retrieving revision 1.453
diff -u -b -r1.452 -r1.453
--- po/proprietary-surveillance.fr.po   13 Jul 2019 18:03:57 -0000      1.452
+++ po/proprietary-surveillance.fr.po   15 Jul 2019 10:02:25 -0000      1.453
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-13 17:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2019-07-13 20:03+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-15 09:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1493,6 +1494,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- po/proprietary-surveillance.it-diff.html    13 Jul 2019 18:01:18 -0000      
1.151
+++ po/proprietary-surveillance.it-diff.html    15 Jul 2019 10:02:25 -0000      
1.152
@@ -1096,11 +1096,28 @@
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after</strong></del></span>
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    report even which page</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for surveillance is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on</strong></del></span> <span 
class="inserted"><ins><em>user reads at</em></ins></span> what <span 
class="removed"><del><strong>users post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -1117,23 +1134,27 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share the picture you take 
according</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This <span 
class="removed"><del><strong>example</strong></del></span> illustrates <span 
class="removed"><del><strong>how &ldquo;getting the user's consent&rdquo;
-        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>that making unauthorized copies of nonfree 
software</em></ins></span>
-    is <span class="removed"><del><strong>inadequate as</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cure for the injustice of nonfree software. It may 
avoid
-    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across</strong></del></span> <span 
class="inserted"><ins><em>illustrates that making unauthorized copies of 
nonfree software
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1141,268 +1162,326 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track</em></ins></span>
+    users' <span class="removed"><del><strong>pictures are private
+      anymore,</strong></del></span> <span 
class="inserted"><ins><em>movements</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware (DRM and snooping). 
In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting to realize that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the</strong></del></span> <span 
class="inserted"><ins><em>secretly a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It snoops on users, too,</em></ins></span> as <span 
class="inserted"><ins><em>you must expect from nonfree
+    programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+  &lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware that can</em></ins></span> snoop on <span 
class="removed"><del><strong>what radio</strong></del></span> <span 
class="inserted"><ins><em>a lot of
-    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>contact list,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> proprietary <span 
class="removed"><del><strong>apps for mobile devices report which other
+    apps</strong></del></span> <span class="inserted"><ins><em>phone 
app&lt;/a&gt; to be allowed into</em></ins></span>
+    the <span class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>event.&lt;/p&gt;
+
+    &lt;p&gt;This app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>at least is visible</strong></del></span> <span 
class="inserted"><ins><em>can snoop on a lot of
+    sensitive data, including user's location</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app</strong></del></span> 
<span class="inserted"><ins><em>has</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on 
the user&lt;/a&gt;. This</strong></del></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>picture you 
take according</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily be
-    traced back</em></ins></span> to <span class="inserted"><ins><em>the 
woman</em></ins></span> who
-      <span class="removed"><del><strong>is in</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
+    available</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily</em></ins></span> be <span 
class="removed"><del><strong>distracted by</strong></del></span>
+    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>app developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>women's 
rights</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>equal employment
+    and freedom</em></ins></span> to <span class="removed"><del><strong>the 
app developer but did not
+      ask about sending it to other companies.  This shows the
+      weakness of the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>make their own pregnancy choices. Don't use
+    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>do so.</em></ins></span> A <span 
class="removed"><del><strong>free software flashlight</strong></del></span>
+    <span class="inserted"><ins><em>free-software</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature 
seems</strong></del></span> <span class="inserted"><ins><em>has harmful 
implications for women's rights</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>equal employment
-    and freedom</em></ins></span> to <span class="removed"><del><strong>some
-      known-faces database, which means the pictures are likely to be
-      sent across the wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
 
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>make 
their own pregnancy choices. Don't use
-    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
-    free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>that does more 
or less the same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and the NSA takes advantage</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information</strong></del></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>same 
thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>you is 
available from</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>some
-      are starting to realize that it is nasty.&lt;/p&gt;
 
-      &lt;p&gt;This article shows the</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>new one</em></ins></span> is <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude</strong></del></span> <span class="inserted"><ins><em>huge 
number</em></ins></span> of <span class="removed"><del><strong>the proprietary 
software industry towards
-      those they</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have access 
to</em></ins></span>
+    the <span class="removed"><del><strong>U.S.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> <span 
class="inserted"><ins><em>access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden</em></ins></span> apps <span 
class="removed"><del><strong>for mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>may either call 
home with
-    the data, or pass it on to user-installed</em></ins></span> apps <span 
class="inserted"><ins><em>that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which</em></ins></span> the user has
-    <span class="removed"><del><strong>installed.</strong></del></span> <span 
class="inserted"><ins><em>absolutely no control.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to</em></ins></span> the 
<span class="removed"><del><strong>toys with a mobile 
phone.</strong></del></span> <span 
class="inserted"><ins><em>data.</em></ins></span> This <span 
class="removed"><del><strong>would
+      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>results</em></ins></span> in <span 
class="inserted"><ins><em>massive
+    surveillance</em></ins></span> on <span class="removed"><del><strong>a 
child's speech, and even speak
+      into</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;</em></ins></span>
+    &lt;p&gt;A <span class="removed"><del><strong>computerized vibrator
+      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
 
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>24 &ldquo;health&rdquo; apps found</em></ins></span> 
that <span class="removed"><del><strong>made the vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>19</em></ins></span> of <span 
class="inserted"><ins><em>them &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive</em></ins></span> personal <span 
class="removed"><del><strong>information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was anonymizing 
the</strong></del></span> data <span class="removed"><del><strong>may be
+      true, but</strong></del></span> <span class="inserted"><ins><em>to third 
parties&lt;/a&gt;, which can use</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
+    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>doing this</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span>
-    <span class="inserted"><ins><em>lengthy terms of service</em></ins></span> 
that <span class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>are difficult to understand. In any case,
-    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>visible and
-    optional&lt;/a&gt;. Not as bad as what the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>not 
sufficient to legitimize snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>had sold the data</strong></del></span> 
<span class="inserted"><ins><em>is buried in
+    lengthy terms of service that are difficult</em></ins></span> to <span 
class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
-    library</em></ins></span> for <span class="removed"><del><strong>children 
don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="inserted"><ins><em>convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>to Facebook&lt;/a&gt;. Lots of companies built apps 
that
+    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="inserted"><ins><em>personal</em></ins></span>
+    data <span class="removed"><del><strong>broker</strong></del></span> <span 
class="inserted"><ins><em>they collected</em></ins></span> would <span 
class="removed"><del><strong>have been able to figure out
+      who the user was.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>building mobile apps, which also</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>companies built apps that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>personal
-    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That 
is</strong></del></span> <span class="inserted"><ins><em>Facebook as 
well.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>one 
can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not even the
+    developers</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps</em></ins></span> use <span class="removed"><del><strong>by 
companies.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
 
-      &lt;p&gt;The FTC criticized this app because it asked the user to
-      approve sending</strong></del></span> <span class="inserted"><ins><em>and
-    misuse users'</em></ins></span> personal <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="inserted"><ins><em>other companies, and &lt;a
+    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>these conversations
+      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
-    that</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
-      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
-      app would not.&lt;/p&gt;
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware</em></ins></span> 
in <span class="removed"><del><strong>Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>companies, and</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage to spy through it too&lt;/a&gt;.
-      Here's information</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be</em></ins></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>Google Play had one or</em></ins></span> more 
<span class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span> <span class="inserted"><ins><em>malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,
-      a speech recognition company based in</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys</strong></del></span> <span 
class="inserted"><ins><em>user interface of most of them was designed to make 
uninstallation
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>users, and 
redirecting
+    them to phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should</em></ins></span> also <span 
class="removed"><del><strong>contain major security vulnerabilities; crackers
-      can remotely control the toys with</strong></del></span> <span 
class="inserted"><ins><em>stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
+    there</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span> 
really
+<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; due to DNS 
leaks. In
-    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="inserted"><ins><em>their
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>users. 
Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover,</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half
 of</em></ins></span>
-    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>Parliament
+  this way, because they pass</strong></del></span>
+    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
     apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201901050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span class="removed"><del><strong>was 
reporting</strong></del></span> <span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>was surrounded by</strong></del></span> <span 
class="inserted"><ins><em>will do
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>side issue. What</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>data is</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>secondary issue. The principal wrong here 
is</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span>
-    the <span class="removed"><del><strong>vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>company gets that data at all.&lt;/p&gt;
+    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
@@ -1411,134 +1490,68 @@
   &lt;/li&gt;
 
   &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps &lt;a
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
     report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>it was 
anonymizing</strong></del></span>
-    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the data <span class="removed"><del><strong>may be
-      true, but</strong></del></span> it <span 
class="removed"><del><strong>doesn't really matter. If it had 
sold</strong></del></span> <span class="inserted"><ins><em>obtains 
from</em></ins></span> the <span class="removed"><del><strong>data to a
-      data broker,</strong></del></span> <span class="inserted"><ins><em>same 
machine via
-    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>data broker would have been able to 
figure out
-      who</strong></del></span> <span class="inserted"><ins><em>user's 
activities in the app; others only say that</em></ins></span> the user <span 
class="removed"><del><strong>was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>is
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> has <span 
class="removed"><del><strong>been ordered to pay</strong></del></span> a <span 
class="removed"><del><strong>total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>phones of users 
that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected</strong></del></span> <span class="inserted"><ins><em>other 
kinds of location
-    tracking, but most users will be tricked</em></ins></span> by the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen to these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
     &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be</em></ins></span> sure <span 
class="inserted"><ins><em>from the article.&lt;/p&gt;
+    a recording. But I can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will 
benefit</em></ins></span> in <span class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to 
snoop</em></ins></span>
-    and <span class="removed"><del><strong>spyware via 
BIOS&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>collect 
information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>its users.  
Furthermore, they could
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence</em></ins></span> that <span 
class="inserted"><ins><em>proprietary apps generally work against
+    &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
-    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>place new items on top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
-    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
@@ -3258,7 +3271,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/13 18:01:18 $
+$Date: 2019/07/15 10:02:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.312
retrieving revision 1.313
diff -u -b -r1.312 -r1.313
--- po/proprietary-surveillance.it.po   13 Jul 2019 18:01:18 -0000      1.312
+++ po/proprietary-surveillance.it.po   15 Jul 2019 10:02:25 -0000      1.313
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-13 17:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1896,6 +1896,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- po/proprietary-surveillance.ja-diff.html    13 Jul 2019 18:01:18 -0000      
1.166
+++ po/proprietary-surveillance.ja-diff.html    15 Jul 2019 10:02:25 -0000      
1.167
@@ -1011,20 +1011,11 @@
     &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
 
       &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across the wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
+      known-faces database,</strong></del></span> <span 
class="inserted"><ins><em>Kindle: &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    report even</em></ins></span> which <span 
class="removed"><del><strong>means</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -1041,30 +1032,23 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="removed"><del><strong>be
+      sent across</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
-    is <span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary 
apps</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1072,79 +1056,118 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track</em></ins></span>
+    users' <span class="removed"><del><strong>pictures are private
+      anymore,</strong></del></span> <span 
class="inserted"><ins><em>movements</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>based</strong></del></span> <span 
class="inserted"><ins><em>secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
-    apps the user has
-    installed.</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>users, 
too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
+    requirement</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span> <span class="inserted"><ins><em>run a 
proprietary phone app&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
 
-    &lt;p&gt;This app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>at least is visible</strong></del></span> <span 
class="inserted"><ins><em>can snoop on a lot of
-    sensitive data, including user's location</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
-  &lt;/li&gt;
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>be allowed into</em></ins></span>
+    the <span class="removed"><del><strong>&lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;This app</em></ins></span> is a <span 
class="removed"><del><strong>typical example of
+      the attitude</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop on a lot</em></ins></span> of
+    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on 
the user&lt;/a&gt;. This</strong></del></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>the user 
has
+    installed.</strong></del></span> <span class="inserted"><ins><em>is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span> <span class="inserted"><ins><em>&ldquo;anonymized and 
aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
 
-      &lt;p&gt;Don't</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily</em></ins></span> be <span 
class="removed"><del><strong>distracted by</strong></del></span>
-    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>app developers get
-      users</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span class="inserted"><ins><em>equal 
employment
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
     and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
-    spying on you</em></ins></span> is <span class="removed"><del><strong>no 
excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>reward to do so. A
+    free-software app</em></ins></span> that <span 
class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>does more or less the same thing without
+    spying on you</em></ins></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
+    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user</strong></del></span>
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the</em></ins></span> data, <span class="removed"><del><strong>including 
geolocation, for use by companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>or pass</em></ins></span> it <span 
class="removed"><del><strong>asked the user</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps 
that have access</em></ins></span> to
-    the <span class="removed"><del><strong>app developer</strong></del></span> 
<span class="inserted"><ins><em>network</em></ins></span> but <span 
class="removed"><del><strong>did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>no direct access</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>the data.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>results in massive
+    preinstalled nonfree</em></ins></span> apps <span 
class="removed"><del><strong>snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>that have 
access</em></ins></span> to <span class="inserted"><ins><em>sensitive data 
without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>snooping done 
by</strong></del></span> <span class="inserted"><ins><em>data, or pass it on to 
user-installed apps that have access to</em></ins></span>
+    the <span class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>network but no direct 
access to</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>data. This results</em></ins></span> in <span 
class="inserted"><ins><em>massive
     surveillance on which</em></ins></span> the
-      <span class="removed"><del><strong>weakness of the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
+      users to say &ldquo;I agree&rdquo;. That is</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>control.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it asked the user to
+      approve sending</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive</em></ins></span> personal data to <span 
class="removed"><del><strong>the app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can 
use</em></ins></span> it <span class="removed"><del><strong>to other companies. 
 This shows the
+      weakness</strong></del></span>
+    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
+    medical condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
+      app send</strong></del></span> <span 
class="inserted"><ins><em>understand. In</em></ins></span> any <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>case,
+    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1155,23 +1178,22 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>GeForce Experience</strong></del></span>
+    <span class="inserted"><ins><em>library for building mobile apps, which 
also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
       users identify themselves and then sends</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
       <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Angry Birds
       &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which can use it</em></ins></span>
-    for <span class="removed"><del><strong>companies, and the NSA takes 
advantage to spy through</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising or discriminating against people 
in poor
-    medical condition.&lt;/p&gt;
-
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>too&lt;/a&gt;.
+      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
+    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>personal
+    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
       Here's information on
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
@@ -1182,46 +1204,39 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>is buried</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots</strong></del></span>
-    <span class="inserted"><ins><em>lengthy terms</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-    people use it&lt;/a&gt;.&lt;/p&gt;
-
-       &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>service</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes the data may be
-        true, but it doesn't really matter. If it sells the 
data</strong></del></span> <span class="inserted"><ins><em>are difficult to 
understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="inserted"><ins><em>convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>to Facebook&lt;/a&gt;. Lots of companies built apps 
that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="inserted"><ins><em>personal</em></ins></span>
-    data <span class="removed"><del><strong>broker</strong></del></span> <span 
class="inserted"><ins><em>they collected would go to Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one</em></ins></span> can <span 
class="removed"><del><strong>figure out who</strong></del></span> <span 
class="inserted"><ins><em>trust a nonfree program, not even</em></ins></span> 
the <span class="removed"><del><strong>user is.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>app 
reports</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
+   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows</em></ins></span> that <span 
class="removed"><del><strong>makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>no one can trust a nonfree program, not even the
+    developers</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives</em></ins></span> information <span 
class="removed"><del><strong>about</strong></del></span> <span 
class="inserted"><ins><em>on &lt;a
+    href="https://www.appcensus.mobi"&gt;</em></ins></span> how
+    <span class="removed"><del><strong>people</strong></del></span> <span 
class="inserted"><ins><em>Android apps</em></ins></span> use <span 
class="removed"><del><strong>it&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;The company's statement that it anonymizes the data may be
+        true, but it doesn't really matter. If it sells</strong></del></span> 
<span class="inserted"><ins><em>and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>a
+        data broker, the data broker can figure out who the user is.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span> <span class="inserted"><ins><em>other 
companies, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;The app reports the temperature</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
     18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking</em></ins></span> by
       <span class="removed"><del><strong>minute (thus, indirectly, whether 
it</strong></del></span> <span class="inserted"><ins><em>resetting it.&lt;/p&gt;
@@ -1317,8 +1332,8 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect the emails</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>members of Parliament
+      &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>Parliament
   this way, because</strong></del></span>
     <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
 
@@ -1404,28 +1419,17 @@
     report</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>many e-readers&mdash;not</strong></del></span> 
<span class="inserted"><ins><em>the app; others</em></ins></span> only <span 
class="inserted"><ins><em>say that</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
-
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
user <span class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones</em></ins></span> of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>report even which page</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of</strong></del></span> data <span 
class="removed"><del><strong>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
       needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1438,39 +1442,52 @@
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
   &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
   effectively
-  anyone</strong></del></span>
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in</strong></del></span> 
<span class="inserted"><ins><em>it obtains from the same machine 
via</em></ins></span>
+    various
+  <span class="removed"><del><strong>settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because</strong></del></span> <span 
class="inserted"><ins><em>apps. Some of them send Facebook detailed information 
about</em></ins></span>
+    the <span class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>user's activities in</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>app; others only say</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software in</strong></del></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is
+    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Even if no one connects to</strong></del></span>
+    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>system has 
no authentication</strong></del></span> <span class="inserted"><ins><em>user's 
location even</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>users disable &ldquo;location
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track</em></ins></span> the <span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>phones 
of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>user's location 
even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
-    tracking, but most users will</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>tricked by</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>car remotely, the cell phone
-    modem enables the phone company to track the car's</strong></del></span> 
<span class="inserted"><ins><em>user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
@@ -1567,17 +1584,15 @@
 &lt;p&gt;Emo Phillips made</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a <span class="removed"><del><strong>joke: The 
other day</strong></del></span> <span class="inserted"><ins><em>user's 
movements around</em></ins></span> a <span class="removed"><del><strong>woman 
came up to me</strong></del></span> <span class="inserted"><ins><em>physical 
store by noticing WiFi
+    follow</em></ins></span> a <span class="removed"><del><strong>joke: The 
other day</strong></del></span> <span class="inserted"><ins><em>user's 
movements around</em></ins></span> a <span class="removed"><del><strong>woman 
came up</strong></del></span> <span class="inserted"><ins><em>physical store by 
noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article misuses the words
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that this article misuses 
the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
@@ -1585,9 +1600,11 @@
   &lt;li id="M201707270"&gt;
     &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see 
you</strong></del></span> <span class="inserted"><ins><em>sent them and text 
messages and emails to snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>the contrary, it
     worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
@@ -1596,99 +1613,180 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More</strong></del></span> <span 
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google Play,
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on</strong></del></span> <span class="inserted"><ins><em>hand, Google 
redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice 
of</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was</strong></del></span> <span 
class="inserted"><ins><em>being
+    nonfree. It also distributes its own nonfree apps, such</em></ins></span> 
as <span class="inserted"><ins><em>Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could 
more</em></ins></span> or less <span class="removed"><del><strong>all 
&ldquo;smart&rdquo; TVs</strong></del></span>
-    <span class="inserted"><ins><em>prevent such snooping, except when the app 
developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
+    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>preventing apps from
+    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
+    to <span class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally inadequate.
+      And</strong></del></span> <span class="inserted"><ins><em>inspect 
executable proprietary apps to see</em></ins></span> what <span 
class="removed"><del><strong>happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>they 
do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps, and study
+    the source code somehow</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs</strong></del></span> <span 
class="inserted"><ins><em>app developers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>clever
+    enough</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
+      their users: their</strong></del></span>
 
-  &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop</em></ins></span> on <span 
class="removed"><del><strong>their</strong></del></span> 
users&lt;/a&gt;.&lt;/p&gt;
+    snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    <span class="inserted"><ins><em>&lt;p&gt;With free software apps, users 
could &lt;em&gt;make sure&lt;/em&gt; that they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> <span 
class="inserted"><ins><em>they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn this off, but having it enabled by 
default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being 
watched</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users</em></ins></span> 
by
+      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
+      social media participation, Tivo can now</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
+    to
+      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>ultrasound 
from beacons placed in stores or played</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and</strong></del></span> TV <span 
class="removed"><del><strong>advertisements play inaudible 
sounds</strong></del></span>
+    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
-    
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
-    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
-    along with the headphone's unique serial 
number.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>suit accuses that this was done without the users' 
consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>do lots 
of surveillance, judging</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other devices in
+      range so as to determine that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access</em></ins></span> it <span 
class="removed"><del><strong>isn't a TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span> <span 
class="inserted"><ins><em>demands to personal data in</em></ins></span> the 
<span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
+    the <span class="removed"><del><strong>internet to another
+    company, Nuance&lt;/a&gt;.  Nuance can save it and</strong></del></span> 
<span class="inserted"><ins><em>app</em></ins></span> would <span 
class="removed"><del><strong>then have to
+      give it to</strong></del></span> <span 
class="inserted"><ins><em>record</em></ins></span> the <span 
class="removed"><del><strong>US or some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>names of the audio files users 
listen</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
+    by free software in your own computer.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span>
+    <span class="inserted"><ins><em>along with</em></ins></span> the <span 
class="removed"><del><strong>switch to turn this off has no effect.  (The 
fact</strong></del></span> <span class="inserted"><ins><em>headphone's unique 
serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="inserted"><ins><em>this was done without</em></ins></span> the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
+    If</em></ins></span> the <span class="removed"><del><strong>server
+      could save</strong></del></span> <span class="inserted"><ins><em>fine 
print of the app said</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>users gave consent for this,
+    would that make</em></ins></span> it <span 
class="inserted"><ins><em>acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design</em></ins></span>
+    the <span class="removed"><del><strong>user's local 
network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>stop this, but any product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
     &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
-    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+    to transmit users' personal data to servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    study found tens</em></ins></span> of <span 
class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops</strong></del></span>
 
-  &lt;li id="M201703300"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets when they use
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install</em></ins></span>
+    on <span class="removed"><del><strong>what programs people watch, and even 
what</strong></del></span> <span class="inserted"><ins><em>some of its phones. 
The app will give Verizon the same information
+    about the users' searches that Google normally gets when</em></ins></span> 
they <span class="removed"><del><strong>wanted to record.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtPlay --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
-    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>their users</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>report to</strong></del></span> the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>user must
     explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>still spyware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app &lt;a
-    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
+    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user</em></ins></span> data <span class="removed"><del><strong>about their 
users</strong></del></span> <span class="inserted"><ins><em>to a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+    movements before</em></ins></span> and <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
@@ -2409,69 +2507,44 @@
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
-    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
-
-    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
+    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+  &lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV manufacturers in spying</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that 
snoops</em></ins></span> on 
-      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>its user by
+    offers a gratis electronic toothbrush that snoops on its user by
     sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>products are 
designed &lt;a
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone</em></ins></span> in <span 
class="removed"><del><strong>detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> can <span 
class="removed"><del><strong>track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
-    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
+    a device that can obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
+  &lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
-      range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2487,10 +2560,8 @@
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="inserted"><ins><em>companies
-    monitor every aspect of what</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2499,18 +2570,16 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>Web activity, and
-      other</strong></del></span> <span class="inserted"><ins><em>an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>watch is designed &lt;a
+  &lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
     to report its location to someone else and to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
@@ -2525,36 +2594,31 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
&lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
+    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to a junkyard the driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902011"&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
+    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
     near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> <span 
class="inserted"><ins><em>sends Ford a lot of data,
-    including car location. This feature operates even when</em></ins></span> 
the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>ignition
+    connected to the cellular phone network and sends Ford a lot of data,
+    including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
-    antenna in aluminum foil?&lt;/p&gt;</em></ins></span>
+    antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201811300"&gt;
+  &lt;li id="M201811300"&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with a terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
-    transfers technical data, including car location,</em></ins></span>
-    to <span class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>a government-run platform&lt;/a&gt;. In practice, 
&lt;a
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
     href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to the government-run platform.&lt;/p&gt;
@@ -2566,33 +2630,29 @@
     tracked the choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
-      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
-    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
-    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
+    &lt;p&gt;GM did not get</em></ins></span> users' 
+      <span class="removed"><del><strong>friends</strong></del></span> <span 
class="inserted"><ins><em>consent, but it could have got that easily by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="inserted"><ins><em>you,
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection 
should</em></ins></span> be <span class="removed"><del><strong>trusted unless 
it</strong></del></span> <span class="inserted"><ins><em>forbidden.&lt;/p&gt;
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the 
software</em></ins></span>
-    is <span class="removed"><del><strong>done
-    by</strong></del></span> free <span class="removed"><del><strong>software 
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't 
collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track</em></ins></span> your <span class="removed"><del><strong>own 
computer.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>every 
move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree software 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  &lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2600,81 +2660,43 @@
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and
-      <span class="removed"><del><strong>the switch</strong></del></span> 
<span class="inserted"><ins><em>make changes in various
-    settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>turn this off</strong></del></span> <span 
class="inserted"><ins><em>do because the system</em></ins></span> has no <span 
class="removed"><del><strong>effect.  (The fact that the
-      transmission reports a 404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>authentication
-    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>server
-      could save that data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if</em></ins></span> it
-      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>asked
-    for authentication, you couldn't be confident that Nissan
-    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
 
-&lt;!-- #SpywareAtPlay --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+      &lt;p&gt;Even nastier, they</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
+    settings&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and report</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    &lt;p&gt;That's easy to</em></ins></span> do <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>because the system has no authentication
+    when accessed</em></ins></span> through <span 
class="removed"><del><strong>ad networks</strong></del></span> <span 
class="inserted"><ins><em>the modem.  However, even if it asked
+    for authentication, you couldn't be confident</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>Nissan
+    has no access.  The software in the car is proprietary, &lt;a
+    href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
     enables the phone company to track the car's movements all the time;
-    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
+    it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
-      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
-      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow</em></ins></span> the <span 
class="inserted"><ins><em>company to extract</em></ins></span>
+    data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>sites made by different 
+      companies.&lt;/p&gt;
 
-      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+      &lt;p&gt;They use</strong></del></span> <span 
class="inserted"><ins><em>determine the car's location
+    at any time. (See Section 2, paragraphs b and c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
-    information, but if the state orders it to get</em></ins></span> the data
-      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state can store it.&lt;/p&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't 
store</em></ins></span> this <span class="removed"><del><strong>data to 
manipulate people</strong></del></span>
+    <span class="inserted"><ins><em>information, but if the state orders 
it</em></ins></span> to <span class="removed"><del><strong>buy 
things,</strong></del></span> <span class="inserted"><ins><em>get the 
data</em></ins></span> and <span class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state</em></ins></span> can <span 
class="removed"><del><strong>be led</strong></del></span> <span 
class="inserted"><ins><em>store it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201303250"&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
     
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
-      companies.&lt;/p&gt;
-
-      &lt;p&gt;They use this data to manipulate people</strong></del></span>
-    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
+    records information about drivers' movements&lt;/a&gt;, which is made
+    available</em></ins></span> to <span class="removed"><del><strong>spend a 
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers, 
insurance companies, and others.&lt;/p&gt;
 
     &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
       also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
@@ -3109,7 +3131,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/13 18:01:18 $
+$Date: 2019/07/15 10:02:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- po/proprietary-surveillance.ja.po   13 Jul 2019 18:01:18 -0000      1.291
+++ po/proprietary-surveillance.ja.po   15 Jul 2019 10:02:25 -0000      1.292
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-13 17:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1428,6 +1428,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- po/proprietary-surveillance.pot     13 Jul 2019 18:01:18 -0000      1.233
+++ po/proprietary-surveillance.pot     15 Jul 2019 10:02:25 -0000      1.234
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-13 17:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1049,6 +1049,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a "
+"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\";>
 "
+"not to allow them access to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a "
 
"href=\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners\";>
 "
 "tool for propaganda</a> by natalist Christians.  It spreads distrust for "

Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.546
retrieving revision 1.547
diff -u -b -r1.546 -r1.547
--- po/proprietary-surveillance.ru.po   13 Jul 2019 19:29:10 -0000      1.546
+++ po/proprietary-surveillance.ru.po   15 Jul 2019 10:02:25 -0000      1.547
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-13 17:55+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-15 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1478,6 +1479,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- po/proprietary.de-diff.html 15 Jul 2019 09:30:56 -0000      1.103
+++ po/proprietary.de-diff.html 15 Jul 2019 10:02:25 -0000      1.104
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -129,9 +129,9 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -161,10 +161,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -186,6 +186,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201809210"&gt;
     &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
     developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
@@ -249,16 +259,6 @@
     is collected by the company, there is no telling what it will be
     used for.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
-    for contraception.&lt;/p&gt;
-
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -319,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 09:30:56 $
+$Date: 2019/07/15 10:02:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- po/proprietary.de.po        15 Jul 2019 09:30:56 -0000      1.145
+++ po/proprietary.de.po        15 Jul 2019 10:02:25 -0000      1.146
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -439,6 +439,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -513,18 +527,6 @@
 "collected by the company, there is no telling what it will be used for."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- po/proprietary.es.po        15 Jul 2019 09:30:56 -0000      1.180
+++ po/proprietary.es.po        15 Jul 2019 10:02:25 -0000      1.181
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -304,6 +304,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -424,25 +438,6 @@
 "(en el caso de DoorDash). Una vez que la compañía ha recogido esta "
 "información, no hay manera de saber para qué va a utilizarla."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
-msgstr ""
-"La aplicación de «fertilidad» Femm sirve suprepticiamente como <a href="
-"\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-";
-"app-is-funded-by-anti-abortion-campaigners\">instrumento de propaganda</a> "
-"de cristianos natalistas. Siembra desconfianza con respecto a la "
-"contracepción."
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-"Además, espía a los usuarios, como cabe esperar de cualquier programa que 
no "
-"sea libre."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -522,6 +517,23 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
+#~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
+#~ "by-anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
+#~ "Christians.  It spreads distrust for contraception."
+#~ msgstr ""
+#~ "La aplicación de «fertilidad» Femm sirve suprepticiamente como <a href="
+#~ "\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-";
+#~ "app-is-funded-by-anti-abortion-campaigners\">instrumento de propaganda</"
+#~ "a> de cristianos natalistas. Siembra desconfianza con respecto a la "
+#~ "contracepción."
+
+#~ msgid "It snoops on users, too, as you must expect from nonfree programs."
+#~ msgstr ""
+#~ "Además, espía a los usuarios, como cabe esperar de cualquier programa 
que "
+#~ "no sea libre."
+
+#~ msgid ""
 #~ "Amazon Alexa collects a lot more information from users than is necessary "
 #~ "for correct functioning (time, location, recordings made without a "
 #~ "legitimate prompt), and sends it to Amazon's servers, which store it "

Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- po/proprietary.fr.po        15 Jul 2019 09:30:56 -0000      1.223
+++ po/proprietary.fr.po        15 Jul 2019 10:02:25 -0000      1.224
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2019-07-13 18:10+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -300,6 +300,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -421,24 +435,6 @@
 "information a été collectée par la société, les paris sont ouverts 
quant à "
 "son utilisation."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
-msgstr ""
-"L'appli de fertilité « Femm » sert secrètement d'<a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\">instrument de propagande</a> aux chrétiens "
-"natalistes. Elle propage la méfiance envers la contraception."
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-"De plus, elle espionne les utilisatrices, comme on peut s'y attendre de la "
-"part d'un programme non libre."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -514,6 +510,22 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
+#~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
+#~ "by-anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
+#~ "Christians.  It spreads distrust for contraception."
+#~ msgstr ""
+#~ "L'appli de fertilité « Femm » sert secrètement d'<a 
href=\"https://www.";
+#~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
+#~ "by-anti-abortion-campaigners\">instrument de propagande</a> aux chrétiens 
"
+#~ "natalistes. Elle propage la méfiance envers la contraception."
+
+#~ msgid "It snoops on users, too, as you must expect from nonfree programs."
+#~ msgstr ""
+#~ "De plus, elle espionne les utilisatrices, comme on peut s'y attendre de "
+#~ "la part d'un programme non libre."
+
+#~ msgid ""
 #~ "Amazon Alexa collects a lot more information from users than is necessary "
 #~ "for correct functioning (time, location, recordings made without a "
 #~ "legitimate prompt), and sends it to Amazon's servers, which store it "

Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- po/proprietary.it-diff.html 15 Jul 2019 09:30:56 -0000      1.115
+++ po/proprietary.it-diff.html 15 Jul 2019 10:02:25 -0000      1.116
@@ -185,6 +185,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201809210"&gt;
     &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
     developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
@@ -248,16 +258,6 @@
     is collected by the company, there is no telling what it will be
     used for.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
-    for contraception.&lt;/p&gt;
-
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -318,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 09:30:56 $
+$Date: 2019/07/15 10:02:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- po/proprietary.it.po        15 Jul 2019 09:30:56 -0000      1.154
+++ po/proprietary.it.po        15 Jul 2019 10:02:25 -0000      1.155
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -517,18 +531,6 @@
 "collected by the company, there is no telling what it will be used for."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- po/proprietary.ja-diff.html 15 Jul 2019 09:30:56 -0000      1.118
+++ po/proprietary.ja-diff.html 15 Jul 2019 10:02:25 -0000      1.119
@@ -182,6 +182,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201809210"&gt;
     &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
     developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
@@ -245,16 +255,6 @@
     is collected by the company, there is no telling what it will be
     used for.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
-    for contraception.&lt;/p&gt;
-
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -315,7 +315,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 09:30:56 $
+$Date: 2019/07/15 10:02:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- po/proprietary.ja.po        15 Jul 2019 09:30:56 -0000      1.138
+++ po/proprietary.ja.po        15 Jul 2019 10:02:25 -0000      1.139
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -307,6 +307,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -381,18 +395,6 @@
 "collected by the company, there is no telling what it will be used for."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- po/proprietary.nl-diff.html 15 Jul 2019 09:30:56 -0000      1.115
+++ po/proprietary.nl-diff.html 15 Jul 2019 10:02:26 -0000      1.116
@@ -185,6 +185,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201809210"&gt;
     &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
     developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
@@ -248,16 +258,6 @@
     is collected by the company, there is no telling what it will be
     used for.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
-    for contraception.&lt;/p&gt;
-
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -318,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 09:30:56 $
+$Date: 2019/07/15 10:02:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- po/proprietary.nl.po        15 Jul 2019 09:30:56 -0000      1.126
+++ po/proprietary.nl.po        15 Jul 2019 10:02:26 -0000      1.127
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -510,18 +524,6 @@
 "collected by the company, there is no telling what it will be used for."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- po/proprietary.pl-diff.html 15 Jul 2019 09:30:56 -0000      1.133
+++ po/proprietary.pl-diff.html 15 Jul 2019 10:02:26 -0000      1.134
@@ -183,6 +183,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201809210"&gt;
     &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
     developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
@@ -246,16 +256,6 @@
     is collected by the company, there is no telling what it will be
     used for.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
-    for contraception.&lt;/p&gt;
-
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -316,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 09:30:56 $
+$Date: 2019/07/15 10:02:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- po/proprietary.pl.po        15 Jul 2019 09:30:56 -0000      1.121
+++ po/proprietary.pl.po        15 Jul 2019 10:02:26 -0000      1.122
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -593,18 +607,6 @@
 "collected by the company, there is no telling what it will be used for."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- po/proprietary.pot  15 Jul 2019 09:30:56 -0000      1.118
+++ po/proprietary.pot  15 Jul 2019 10:02:26 -0000      1.119
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a "
+"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\";>
 "
+"not to allow them access to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -325,18 +338,6 @@
 "collected by the company, there is no telling what it will be used for."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a "
-"href=\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners\";>
 "
-"tool for propaganda</a> by natalist Christians.  It spreads distrust for "
-"contraception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- po/proprietary.pt-br.po     15 Jul 2019 09:30:56 -0000      1.181
+++ po/proprietary.pt-br.po     15 Jul 2019 10:02:26 -0000      1.182
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2019-07-01 02:08-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -297,6 +297,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -413,24 +427,6 @@
 "mesmo endereço de entrega (no caso da DoorDash). Uma vez que essa 
informação "
 "é coletada pela empresa, não há como dizer para que ela será usada."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
-msgstr ""
-"O aplicativo de “fertilidade” Femm é secretamente uma <a 
href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> ferramenta de propaganda</a> por cristãos "
-"natalistas. Ele espalha a desconfiança pela contracepção."
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-"Ele espiona os usuários também, como você deve esperar de programas não "
-"livres."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,6 +502,22 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
+#~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
+#~ "by-anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
+#~ "Christians.  It spreads distrust for contraception."
+#~ msgstr ""
+#~ "O aplicativo de “fertilidade” Femm é secretamente uma <a 
href=\"https://";
+#~ "www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-"
+#~ "funded-by-anti-abortion-campaigners\"> ferramenta de propaganda</a> por "
+#~ "cristãos natalistas. Ele espalha a desconfiança pela contracepção."
+
+#~ msgid "It snoops on users, too, as you must expect from nonfree programs."
+#~ msgstr ""
+#~ "Ele espiona os usuários também, como você deve esperar de programas 
não "
+#~ "livres."
+
+#~ msgid ""
 #~ "Amazon Alexa collects a lot more information from users than is necessary "
 #~ "for correct functioning (time, location, recordings made without a "
 #~ "legitimate prompt), and sends it to Amazon's servers, which store it "

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -b -r1.258 -r1.259
--- po/proprietary.ru.po        15 Jul 2019 09:30:56 -0000      1.258
+++ po/proprietary.ru.po        15 Jul 2019 10:02:26 -0000      1.259
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -303,6 +303,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -310,22 +324,20 @@
 "proprietary-addictions.html#addictiveness\"> psychological manipulation "
 "techniques</a>."
 msgstr ""
+"Cash of Clans&nbsp;&mdash; хороший пример бесплатной 
мобильной игры, которую "
+"ее разработчики сделали <a 
href=\"https://gamerant.com/clash-of-clans-";
+"addiction/\"> вызывающей сильную зависимость</a> 
у большой доли "
+"пользователей&nbsp;&mdash; и превратили в 
автомат, производящий деньги для "
+"разработчиков, с помощью <a 
href=\"/proprietary/proprietary-addictions."
+"html#addictiveness\"> приемов психологической 
манипуляции</a>."
 
 #. type: Content of: <ul><li><p>
-# | [-Unfortunately, the-]{+The+} article uses &ldquo;free&rdquo; to mean
-# | &ldquo;zero [-price.&rdquo;-] {+price,&rdquo; which is a usage we should
-# | avoid.+} We recommend saying &ldquo;gratis&rdquo; instead.
-#, fuzzy
-#| msgid ""
-#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
-#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
 msgid ""
 "The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
 "is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
-"К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в значении "
-"&ldquo;нулевой цены&rdquo;. Мы рекомендуем 
вместо этого говорить &ldquo;"
-"бесплатный&rdquo;."
+"В статье слово &ldquo;свободный&rdquo; 
используется в смысле нулевой цены. "
+"Мы рекомендуем вместо этого говорить 
&ldquo;бесплатный&rdquo;."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -423,24 +435,6 @@
 "доставки (в случае DoorDash). После того как 
эта информация собрана "
 "компанией, невозможно сказать, для чего ее 
будут использовать."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
-msgstr ""
-"Приложение &ldquo;рождаемости&rdquo; Femm в тайне 
является <a href=\"https://";
-"www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-"
-"funded-by-anti-abortion-campaigners\"> орудием 
пропаганды</a> христиан-"
-"наталистов. Оно насаждает недоверие к 
контрацепции."
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-"Оно еще и подглядывает за пользователями, 
как и следует ожидать от "
-"несвободных программ."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -520,6 +514,22 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
+#~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
+#~ "by-anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
+#~ "Christians.  It spreads distrust for contraception."
+#~ msgstr ""
+#~ "Приложение &ldquo;рождаемости&rdquo; Femm в 
тайне является <a href="
+#~ "\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-";
+#~ "app-is-funded-by-anti-abortion-campaigners\"> орудием 
пропаганды</a> "
+#~ "христиан-наталистов. Оно насаждает 
недоверие к контрацепции."
+
+#~ msgid "It snoops on users, too, as you must expect from nonfree programs."
+#~ msgstr ""
+#~ "Оно еще и подглядывает за 
пользователями, как и следует ожидать от "
+#~ "несвободных программ."
+
+#~ msgid ""
 #~ "Amazon Alexa collects a lot more information from users than is necessary "
 #~ "for correct functioning (time, location, recordings made without a "
 #~ "legitimate prompt), and sends it to Amazon's servers, which store it "

Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- po/proprietary.zh-tw-diff.html      15 Jul 2019 09:30:57 -0000      1.93
+++ po/proprietary.zh-tw-diff.html      15 Jul 2019 10:02:26 -0000      1.94
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -129,9 +129,9 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -161,10 +161,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -186,6 +186,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201809210"&gt;
     &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
     developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
@@ -249,16 +259,6 @@
     is collected by the company, there is no telling what it will be
     used for.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
-    for contraception.&lt;/p&gt;
-
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -319,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 09:30:57 $
+$Date: 2019/07/15 10:02:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- po/proprietary.zh-tw.po     15 Jul 2019 09:30:57 -0000      1.104
+++ po/proprietary.zh-tw.po     15 Jul 2019 10:02:26 -0000      1.105
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:25+0000\n"
+"POT-Creation-Date: 2019-07-15 09:55+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Cash of Clans is a good example of a gratis mobile game that its developers "
 "<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
 "addictive</a> for a large proportion of its users&mdash;and turned into a "
@@ -424,18 +438,6 @@
 "collected by the company, there is no telling what it will be used for."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
-"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
-"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
-"Christians.  It spreads distrust for contraception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "It snoops on users, too, as you must expect from nonfree programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- po/pt-br.po 15 Jul 2019 09:30:57 -0000      1.136
+++ po/pt-br.po 15 Jul 2019 10:02:26 -0000      1.137
@@ -3435,6 +3435,20 @@
 msgid "Google Insecurity"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 msgid "Google Interference"
 msgstr ""

Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- po/ru.po    15 Jul 2019 09:42:33 -0000      1.235
+++ po/ru.po    15 Jul 2019 10:02:26 -0000      1.236
@@ -3891,27 +3891,20 @@
 "proprietary-addictions.html#addictiveness\"> psychological manipulation "
 "techniques</a>."
 msgstr ""
-"Cash of Clans&nbsp;&mdash; хороший пример бесплатной 
мобильной игры, "
-"которую ее разработчики сделали <a "
-"href=\"https://gamerant.com/clash-of-clans-addiction/\";> вызывающей 
сильную "
-"зависимость</a> у большой доли 
пользователей&nbsp;&mdash; и превратили в "
-"автомат, производящий деньги для 
разработчиков, с помощью <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> приемов псих
ологической манипуляции</a>."
+"Cash of Clans&nbsp;&mdash; хороший пример бесплатной 
мобильной игры, которую "
+"ее разработчики сделали <a 
href=\"https://gamerant.com/clash-of-clans-";
+"addiction/\"> вызывающей сильную зависимость</a> 
у большой доли "
+"пользователей&nbsp;&mdash; и превратили в 
автомат, производящий деньги для "
+"разработчиков, с помощью <a 
href=\"/proprietary/proprietary-addictions."
+"html#addictiveness\"> приемов психологической 
манипуляции</a>."
 
 #. type: Content of: <ul><li><p>
-# | [-Unfortunately, the-]{+The+} article uses &ldquo;free&rdquo; to mean
-# | &ldquo;zero [-price.&rdquo;-] {+price,&rdquo; which is a usage we should
-# | avoid.+} We recommend saying &ldquo;gratis&rdquo; instead.
-#| msgid ""
-#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
-#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
 msgid ""
 "The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
 "is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
-"В статье слово &ldquo;свободный&rdquo; 
используется в смысле "
-"нулевой цены. Мы рекомендуем вместо этого 
говорить &ldquo;"
-"бесплатный&rdquo;."
+"В статье слово &ldquo;свободный&rdquo; 
используется в смысле нулевой цены. "
+"Мы рекомендуем вместо этого говорить 
&ldquo;бесплатный&rdquo;."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -4500,6 +4493,20 @@
 msgid "Google Insecurity"
 msgstr "Уязвимость"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 msgid "Google Interference"
 msgstr "Помехи"

Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- po/zh-tw.po 15 Jul 2019 09:30:57 -0000      1.106
+++ po/zh-tw.po 15 Jul 2019 10:02:26 -0000      1.107
@@ -3146,6 +3146,20 @@
 msgid "Google Insecurity"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many Android apps can track users' movements even when the user says <a href="
+"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+"permissions-data-collection-imei-ssid-location\"> not to allow them access "
+"to locations</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This involves an apparently unintentional weakness in Android, exploited "
+"intentionally by malicious apps."
+msgstr ""
+
 #. type: Content of: <h3>
 msgid "Google Interference"
 msgstr ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]