www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Tue, 16 Jul 2019 16:29:53 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/07/16 16:29:53

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.ru.po nl.po 
                         pl.po pot proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.es.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.107&r2=1.108

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- de.po       15 Jul 2019 10:02:17 -0000      1.108
+++ de.po       16 Jul 2019 20:29:51 -0000      1.109
@@ -814,6 +814,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- es.po       15 Jul 2019 10:02:18 -0000      1.145
+++ es.po       16 Jul 2019 20:29:51 -0000      1.146
@@ -732,6 +732,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- fr.po       15 Jul 2019 11:32:42 -0000      1.188
+++ fr.po       16 Jul 2019 20:29:51 -0000      1.189
@@ -708,6 +708,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- it.po       15 Jul 2019 10:02:18 -0000      1.108
+++ it.po       16 Jul 2019 20:29:51 -0000      1.109
@@ -761,6 +761,20 @@
 msgstr "Backdoor di Apple"
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | The Dropbox app for Macintosh <a
 # | 
[-href=\"http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\";>takes
 # | total-]

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- ja.po       15 Jul 2019 10:02:18 -0000      1.114
+++ ja.po       16 Jul 2019 20:29:51 -0000      1.115
@@ -643,6 +643,20 @@
 msgstr "Appleのバックドア"
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";

Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-apple.de-diff.html  10 Jul 2019 13:00:22 -0000      1.38
+++ malware-apple.de-diff.html  16 Jul 2019 20:29:51 -0000      1.39
@@ -93,6 +93,17 @@
 Mac</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201607284"&gt;
     &lt;p&gt;The Dropbox app for Macintosh &lt;a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
@@ -176,21 +187,20 @@
     DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
     focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
       app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that</em></ins></span> a <span 
class="removed"><del><strong>malicious web site</strong></del></span> <span 
class="inserted"><ins><em>new model of Macbook introduced a
-    requirement for monitors</em></ins></span> to <span 
class="removed"><del><strong>extract all the user's messaging history&lt;/a&gt;.
-    &lt;/p&gt;
+    requirement for monitors</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>have malicious hardware, but DRM software
+    in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>hardware. 
The software for
+    accessing iTunes is also responsible.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage,</strong></del></span> <span class="inserted"><ins><em>have 
malicious hardware,</em></ins></span> but <span 
class="removed"><del><strong>they are not grave enough to qualify 
-for</strong></del></span> <span class="inserted"><ins><em>DRM software
-    in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</strong></del></span> <span class="inserted"><ins><em>hardware. The 
software for
-    accessing iTunes is also responsible.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span>
 
-  &lt;li id="M200708130"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on 
Windows</em></ins></span>
+    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</strong></del></span> <span class="inserted"><ins><em>Bluray 
disks&lt;/a&gt;.  (The article focused on Windows</em></ins></span>
     and <span class="removed"><del><strong>wrong. This section describes 
examples of</strong></del></span> <span class="inserted"><ins><em>said that 
MacOS would do the same thing subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
@@ -232,34 +242,34 @@
 
 &lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-&lt;p&gt;These are situations</strong></del></span>
+&lt;p&gt;These are situations in which Apple employs its power 
over</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock users</em></ins></span> in <span 
class="removed"><del><strong>which</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely to</em></ins></span> Apple <span 
class="removed"><del><strong>employs its power over users</strong></del></span> 
<span class="inserted"><ins><em>services&lt;/a&gt; by being 
designed</em></ins></span> to <span class="removed"><del><strong>directly 
intervene in ways that harm them</strong></del></span> <span 
class="inserted"><ins><em>be incompatible
-    with all other options, ethical</em></ins></span> or <span 
class="removed"><del><strong>block their work.&lt;/p&gt;
+    &lt;p&gt;Apple devices lock</em></ins></span> users
+<span class="removed"><del><strong>to directly intervene</strong></del></span> 
in <span class="removed"><del><strong>ways that harm them or block their 
work.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot 
drives,</strong></del></span> <span 
class="inserted"><ins><em>unethical.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201605044"&gt;
-    &lt;p&gt;iWork (office software that runs on MacOS,
-    iOS and iCloud) uses secret formats</em></ins></span> and &lt;a
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</strong></del></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
     changes the file system from HFS+</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means of
-    converting them</em></ins></span> to <span 
class="removed"><del><strong>APFS&lt;/a&gt;, which cannot be accessed
-    from GNU/Linux, Windows</strong></del></span> or <span 
class="removed"><del><strong>even older versions of MacOS.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely to Apple services&lt;/a&gt; by being designed</em></ins></span> to 
<span class="removed"><del><strong>APFS&lt;/a&gt;, which 
cannot</strong></del></span> be <span class="removed"><del><strong>accessed
+    from GNU/Linux, Windows</strong></del></span> <span 
class="inserted"><ins><em>incompatible
+    with all other options, ethical</em></ins></span> or <span 
class="removed"><del><strong>even older versions of 
MacOS.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unethical.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;Apple will stop &lt;a 
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Apple will stop</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201605044"&gt;
+    &lt;p&gt;iWork (office software that runs on MacOS,
+    iOS and iCloud) uses secret formats and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
     model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, Apple stops people</strong></del></span> from <span 
class="removed"><del><strong>fixing problems themselves;
+    &lt;p&gt;Meanwhile, Apple stops people</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means of
+    converting them to or</em></ins></span> from <span 
class="removed"><del><strong>fixing problems themselves;
     that's</strong></del></span> <span class="inserted"><ins><em>Open Document 
Formats&lt;/a&gt;. iWork
     formats have changed several times since they were first
     introduced. This may have had</em></ins></span> the <span 
class="removed"><del><strong>nature</strong></del></span> <span 
class="inserted"><ins><em>effect</em></ins></span> of <span 
class="removed"><del><strong>proprietary software.&lt;/p&gt;
@@ -386,230 +396,242 @@
 designing general purpose computers with censorship of application
 programs.&lt;/p&gt;
 
-&lt;p&gt;Here is</em></ins></span> an <span class="removed"><del><strong>Apple 
ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving a valid email address 
and receiving</strong></del></span> <span class="inserted"><ins><em>article 
about</em></ins></span> the <span 
class="removed"><del><strong>verification</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;</em></ins></span>
-code <span class="removed"><del><strong>Apple 
-      sends</strong></del></span> <span 
class="inserted"><ins><em>signing&lt;/a&gt; that the iThings 
use</em></ins></span> to <span class="removed"><del><strong>it.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>lock up the user.&lt;/p&gt;
-
-&lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span> <span 
class="inserted"><ins><em>allow limited passage through</em></ins></span> the 
<span class="removed"><del><strong>photos and
-      videos</strong></del></span>
-<span class="inserted"><ins><em>walls of the iThing jail: users can now 
install apps built from
-source code, provided the source code is written in Swift.  Users
-cannot do this freely because</em></ins></span> they <span 
class="removed"><del><strong>make.&lt;/p&gt;
+&lt;p&gt;Here is</em></ins></span> an <span class="inserted"><ins><em>article 
about the &lt;a
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
+
+&lt;p&gt;Curiously,</em></ins></span> Apple <span 
class="removed"><del><strong>ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary</strong></del></span>
 <span class="inserted"><ins><em>is beginning</em></ins></span> to <span 
class="inserted"><ins><em>allow limited passage through the
+walls of the iThing jail: users can now</em></ins></span> install <span 
class="removed"><del><strong>even gratis apps&lt;/a&gt;) without giving a valid 
email address and receiving</strong></del></span> <span 
class="inserted"><ins><em>apps built from
+source code, provided</em></ins></span> the <span 
class="removed"><del><strong>verification</strong></del></span> <span 
class="inserted"><ins><em>source</em></ins></span> code <span 
class="removed"><del><strong>Apple 
+      sends</strong></del></span> <span class="inserted"><ins><em>is written 
in Swift.  Users
+cannot do this freely because they are required</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>identify
+themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
+are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
+big enough</em></ins></span> to <span class="removed"><del><strong>Apple's 
servers all</strong></del></span> <span class="inserted"><ins><em>mean 
that</em></ins></span> the <span class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you make</strong></del></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From</strong></del></span> <span 
class="inserted"><ins><em>required to identify
-themselves.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span 
class="inserted"><ins><em>href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>a crack 
in</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>prison walls, it</em></ins></span> is <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>not
-big enough</em></ins></span> to <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span> <span 
class="inserted"><ins><em>mean that the iThings are no longer jails.&lt;/p&gt;
-
-&lt;h4&gt;Examples of censorship</em></ins></span> by <span 
class="removed"><del><strong>default so it still counts as a
-      surveillance functionality.&lt;/p&gt;
+      iCloud Photo Library stores every photo</strong></del></span> <span 
class="inserted"><ins><em>iThings are no longer jails.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>Apple jails&lt;/h4&gt;
+&lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught in the jail</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>an iMonster are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html"&gt;
 sitting
-    ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
+    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
+    href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
+    ducks for other attackers&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>video you take,</strong></del></span> <span 
class="inserted"><ins><em>the app censorship prevents security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
-    &lt;p&gt;Apple's censorship</em></ins></span> of <span 
class="removed"><del><strong>many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>apps is 
fundamentally unjust, and would be
-    inexcusable even if it didn't lead</em></ins></span> to <span 
class="removed"><del><strong>break Apple's</strong></del></span> security <span 
class="removed"><del><strong>to get at them, but NSA can access any of them 
through</strong></del></span> <span class="inserted"><ins><em>threats as 
well.&lt;/p&gt;
+    &lt;p&gt;Apple's censorship of apps is fundamentally 
unjust,</em></ins></span> and <span class="removed"><del><strong>keeps them 
up</strong></del></span> <span class="inserted"><ins><em>would be
+    inexcusable even if it didn't lead</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>security threats</em></ins></span> as <span 
class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>well.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710130"&gt;
-    &lt;p&gt;Apple is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+    &lt;p&gt;Apple</em></ins></span> is &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
+    censoring apps for</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>US 
government too&lt;/a&gt;. Specifically, it</em></ins></span> is <span 
class="removed"><del><strong>a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span>
+    <span class="inserted"><ins><em>deleting apps developed</em></ins></span> 
by <span class="removed"><del><strong>default so it still counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security to get at them, but NSA can access any</strong></del></span> 
<span class="inserted"><ins><em>Iranians.&lt;/p&gt;
+
+    &lt;p&gt;The root</em></ins></span> of <span 
class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
-  MacOS automatically sends to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
-    censoring apps for the US government too&lt;/a&gt;. Specifically, it is
-    deleting apps developed by Iranians.&lt;/p&gt;
-
-    &lt;p&gt;The root of these wrongs are in Apple. If</em></ins></span> Apple 
<span class="removed"><del><strong>servers unsaved documents being
+  MacOS automatically sends to Apple servers unsaved documents being
   edited&lt;/a&gt;. The &lt;a
   
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
-  things you have</strong></del></span> <span 
class="inserted"><ins><em>had</em></ins></span> not <span 
class="removed"><del><strong>decided to save are even more sensitive 
than</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span>
-    the
-  <span class="removed"><del><strong>things you</strong></del></span> <span 
class="inserted"><ins><em>iMonsters to let Apple censor applications, Apple 
would not</em></ins></span> have <span class="removed"><del><strong>stored in 
files&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>had the power to stop users from 
installing whatever kind of apps.&lt;/p&gt;</em></ins></span>
+  things you have not decided to save</strong></del></span> <span 
class="inserted"><ins><em>these wrongs</em></ins></span> are <span 
class="removed"><del><strong>even more sensitive than the
+  things you have stored</strong></del></span> in <span 
class="removed"><del><strong>files&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple has made various
+  &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files to</strong></del></span> <span 
class="inserted"><ins><em>Apple. If</em></ins></span> Apple <span 
class="removed"><del><strong>servers without asking permission&lt;/a&gt;.
+  This exposes</strong></del></span> <span class="inserted"><ins><em>had not 
designed</em></ins></span>
+    the <span class="removed"><del><strong>files to Big Brother and 
perhaps</strong></del></span> <span 
class="inserted"><ins><em>iMonsters</em></ins></span> to <span 
class="removed"><del><strong>other snoops.&lt;/p&gt;
+
+  &lt;p&gt;It also demonstrates how you can't trust proprietary software,
+  because even if today's version doesn't</strong></del></span> <span 
class="inserted"><ins><em>let Apple censor applications, Apple would 
not</em></ins></span> have <span class="removed"><del><strong>a malicious
+  functionality, tomorrow's version might add it. The developer won't
+  remove the malfeature unless many users push back hard, 
and</strong></del></span>
+    <span class="inserted"><ins><em>had</em></ins></span> the <span 
class="inserted"><ins><em>power to stop</em></ins></span> users
+  <span class="removed"><del><strong>can't remove it 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>from installing whatever kind of 
apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple has made 
various</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations 
in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201707290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
-  MacOS programs send files</strong></del></span>
+    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
+  the latest MacOS send reports</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
     deleted several VPNs from its app store for China&lt;/a&gt;, thus using its
-    own censorship power</em></ins></span> to <span 
class="removed"><del><strong>Apple servers without asking permission&lt;/a&gt;.
-  This exposes</strong></del></span> <span 
class="inserted"><ins><em>strengthen that of</em></ins></span> the <span 
class="removed"><del><strong>files to Big Brother and 
perhaps</strong></del></span> <span class="inserted"><ins><em>Chinese 
government.&lt;/p&gt;
+    own censorship power</em></ins></span> to <span 
class="removed"><del><strong>Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>strengthen that of the Chinese 
government.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship system</em></ins></span> to <span 
class="removed"><del><strong>other snoops.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in MacOS:
+  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701064"&gt;
+    &lt;p&gt;Apple used its censorship system</em></ins></span> to <span 
class="removed"><del><strong>Apple.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;p&gt;It also demonstrates how you can't trust proprietary 
software,</strong></del></span> <span class="inserted"><ins><em>enforce Russian 
surveillance &lt;a
-    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
-    by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple admits the</strong></del></span> <span 
class="inserted"><ins><em>enforce Russian surveillance</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+  spying</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of the LinkedIn app</em></ins></span> in <span 
class="inserted"><ins><em>Russia&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is ironic</em></ins></span> because <span 
class="removed"><del><strong>even if today's version doesn't 
have</strong></del></span> <span class="inserted"><ins><em>LinkedIn 
is</em></ins></span> a <span class="removed"><del><strong>malicious
-  functionality, tomorrow's version might add it. The developer won't
-  remove the malfeature unless many</strong></del></span> <span 
class="inserted"><ins><em>surveillance system itself.
-    While subjecting its</em></ins></span> users <span 
class="removed"><del><strong>push back hard,</strong></del></span> <span 
class="inserted"><ins><em>to its own surveillance, it tries to
-    protect its users from Russian surveillance,</em></ins></span> and <span 
class="inserted"><ins><em>is therefore subject
+    &lt;p&gt;This is ironic because LinkedIn is</em></ins></span> a <span 
class="removed"><del><strong>search facility&lt;/a&gt;, but there's a lot
+  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
+  more snooping that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+  Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>surveillance system itself.
+    While subjecting its users</em></ins></span> to <span 
class="removed"><del><strong>exist for no possible
+  purpose other than surveillance&lt;/a&gt;.  Here</strong></del></span> <span 
class="inserted"><ins><em>its own surveillance, it tries to
+    protect its users from Russian surveillance, and</em></ins></span> is 
<span class="inserted"><ins><em>therefore subject
     to Russian censorship.&lt;/p&gt;
 
-    &lt;p&gt;However,</em></ins></span> the <span 
class="removed"><del><strong>users
-  can't remove it themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>point here is the wrong of Apple's censorship of
+    &lt;p&gt;However,</em></ins></span> the <span 
class="removed"><del><strong>&lt;a
+  
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+  Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>point here is the wrong of Apple's censorship of
     apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations 
in</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201701050"&gt;
-    &lt;p&gt;Apple used its censorship system to enforce China's 
censorship</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
+    &lt;p&gt;Apple used its censorship system to enforce China's 
censorship</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  iBeacon&lt;/a&gt; lets stores determine exactly where</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
-    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send reports to Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>New 
York Times app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>iThing is, and
+  get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>New York Times 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in 
MacOS:</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201605190"&gt;
-    &lt;p&gt;Apple censors games,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple admits</strong></del></span>
+    &lt;p&gt;Apple censors games,</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
-    banning some games from</em></ins></span> the <span 
class="inserted"><ins><em>cr&hellip;app store&lt;/a&gt; because of which
+    banning</em></ins></span> some <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>games</em></ins></span> from <span 
class="removed"><del><strong>iPhones for</strong></del></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>cr&hellip;app store&lt;/a&gt; because of which
     political points they suggest. Some political points are apparently
     considered acceptable.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
-  spying in a search facility&lt;/a&gt;, but there's</strong></del></span> 
<span 
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
-    banned</em></ins></span> a <span class="removed"><del><strong>lot
-  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
-  more snooping that Apple has not talked 
about&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>program from the App Store&lt;/a&gt; because its 
developers
+    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+    banned a program from the App Store&lt;/a&gt; because its developers
     committed the enormity of disassembling some 
iThings.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-  Several &ldquo;features&rdquo;</strong></del></span>
+&lt;p&gt;In this section, we list characteristics</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201509230"&gt;
-    &lt;p&gt;As</em></ins></span> of <span class="removed"><del><strong>iOS 
seem to exist for no possible
-  purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span> <span class="inserted"><ins><em>2015, 
Apple</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-  Technical presentation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;As</em></ins></span> of <span 
class="inserted"><ins><em>2015,</em></ins></span> Apple <span 
class="removed"><del><strong>programs</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+    systematically bans apps</em></ins></span> that <span 
class="removed"><del><strong>block</strong></del></span> <span 
class="inserted"><ins><em>endorse abortion rights</em></ins></span> or
+<span class="removed"><del><strong>hinder users from switching to any 
alternative program&mdash;and, in
+particular, from switching to free software which can liberate the device
+the software runs on.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;The</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
-    systematically bans apps that endorse abortion rights or would help
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;Apple devices lock users in</strong></del></span> <span 
class="inserted"><ins><em>would help
     women find abortions&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This particular political slant</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-  get</strong></del></span>
+    &lt;p&gt;This particular political slant</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+solely to Apple services&lt;/a&gt; by being designed to be incompatible with 
all</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects</em></ins></span> other <span class="removed"><del><strong>info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple 
services&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    affects</em></ins></span> other <span 
class="removed"><del><strong>options, ethical or 
unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple services&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does, &lt;a
-  
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones for</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;iWork (office software</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201506250"&gt;
     &lt;p&gt;Apple has banned iThing
-    applications that show</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved with
-  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>confederate flag.</em></ins></span>  &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not as much</strong></del></span>
+    applications</em></ins></span> that <span 
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
+formats and</strong></del></span> <span class="inserted"><ins><em>show the 
confederate flag.</em></ins></span>  &lt;a <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
-    Not only those that use it</em></ins></span> as <span 
class="removed"><del><strong>Apple claims&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
-
-&lt;p&gt;In this section, we list characteristics</strong></del></span> <span 
class="inserted"><ins><em>a symbol</em></ins></span> of <span 
class="removed"><del><strong>Apple programs</strong></del></span> <span 
class="inserted"><ins><em>racism&lt;/a&gt;, but even
-    strategic games</em></ins></span> that <span 
class="removed"><del><strong>block or
-hinder users from switching</strong></del></span> <span 
class="inserted"><ins><em>use it</em></ins></span> to <span 
class="removed"><del><strong>any alternative 
program&mdash;and,</strong></del></span> <span 
class="inserted"><ins><em>represent confederate army units
-    fighting</em></ins></span> in
-<span class="removed"><del><strong>particular, from switching to free software 
which can liberate</strong></del></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>Civil War.&lt;/p&gt;
+    Not only those that use it as a symbol</em></ins></span> of <span 
class="removed"><del><strong>converting them</strong></del></span> <span 
class="inserted"><ins><em>racism&lt;/a&gt;, but even
+    strategic games that use it</em></ins></span> to <span 
class="removed"><del><strong>or from Open Document Formats&lt;/a&gt;. iWork 
formats
+have changed several times since they were first introduced. This may have
+had</strong></del></span> <span class="inserted"><ins><em>represent 
confederate army units
+    fighting in</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>Civil War.&lt;/p&gt;
 
-    &lt;p&gt;This ludicrous rigidity illustrates</em></ins></span> the <span 
class="removed"><del><strong>software runs on.&lt;/p&gt;
+    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
+    not be allowed to censor apps.  Even if Apple carried out this 
act</em></ins></span> of <span class="removed"><del><strong>thwarting &lt;a
+href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
+efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
 
-&lt;ul&gt;
-&lt;li&gt;
-&lt;p&gt;Apple devices lock users in &lt;a
-href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-solely to</strong></del></span> <span class="inserted"><ins><em>point 
that</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt; by being designed 
to</strong></del></span> <span class="inserted"><ins><em>should
-    not</em></ins></span> be <span class="removed"><del><strong>incompatible 
with all
-other options, ethical</strong></del></span> <span 
class="inserted"><ins><em>allowed to censor apps.  Even if Apple carried out 
this act of
-    censorship with some care, it would still be wrong.  Whether racism
-    is bad, whether educating people about drone attacks is bad, are not
+&lt;p&gt;iWork formats</strong></del></span>
+    <span class="inserted"><ins><em>censorship with some care, it would still 
be wrong.  Whether racism
+    is bad, whether educating people about drone attacks is 
bad,</em></ins></span> are <span class="removed"><del><strong>considered &lt;a
+href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
+unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>not
     the real issue.  Apple should not have the power to impose its views
-    about either of these questions,</em></ins></span> or <span 
class="removed"><del><strong>unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>any other.&lt;/p&gt;</em></ins></span>
+    about either of these questions, or any other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
-formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means</strong></del></span>
+&lt;p&gt;In MacOS</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples</em></ins></span> of <span 
class="removed"><del><strong>converting them</strong></del></span> <span 
class="inserted"><ins><em>Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>iOS,</strong></del></span> <span 
class="inserted"><ins><em>inconsistent censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>or from Open Document Formats&lt;/a&gt;. 
iWork formats
-have changed several times since they were first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>iThings for a time.  It also &lt;a
-    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>procedure</strong></del></span> <span 
class="inserted"><ins><em>iThings</em></ins></span> for <span 
class="inserted"><ins><em>a time.  It also</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
+converting images from</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
     killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed the 
locations</em></ins></span>
-    of <span class="removed"><del><strong>thwarting</strong></del></span> 
<span class="inserted"><ins><em>US drone assassinations, giving various 
excuses. Each
+    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>Photos format&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>locations
+    of US drone assassinations, giving various excuses. Each
     time the developers fixed one &ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection, 
Apple</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse
 engineering
-efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
-
-&lt;p&gt;iWork formats</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    complained about another.  After the fifth rejection, Apple &lt;a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
     admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -619,34 +641,27 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo;</em></ins></span> are <span 
class="removed"><del><strong>considered</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
-unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users, or make option settings hard
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed</em></ins></span> to <span 
class="inserted"><ins><em>mislead users, or make option settings hard
     to find&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
+    &lt;p&gt;This allows</em></ins></span> a <span 
class="removed"><del><strong>free format is so tedious</strong></del></span> 
<span class="inserted"><ins><em>company such as Apple to say, &ldquo;We allow 
users
     to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+    to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;In MacOS and iOS,</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
 
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of</em></ins></span> the <span 
class="removed"><del><strong>procedure for</strong></del></span> <span 
class="inserted"><ins><em>software.  This section reports examples of hard sell 
and other unjust commercial tactics by Apple.&lt;/p&gt;
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
-    &lt;p&gt;Apple Siri</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-converting images from the Photos format&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
-    to <span class="removed"><del><strong>a free format is so 
tedious</strong></del></span> <span class="inserted"><ins><em>give you 
information&lt;/a&gt; about music charts if you're not an Apple
+    &lt;p&gt;Apple Siri &lt;a
+    
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
+    to give you information&lt;/a&gt; about music charts if you're not an Apple
     Music subscriber.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1176,7 +1191,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/10 13:00:22 $
+$Date: 2019/07/16 20:29:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-apple.de.po 10 Jul 2019 13:00:22 -0000      1.133
+++ malware-apple.de.po 16 Jul 2019 20:29:51 -0000      1.134
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -183,6 +183,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-apple.es.po 10 Jul 2019 13:00:23 -0000      1.142
+++ malware-apple.es.po 16 Jul 2019 20:29:51 -0000      1.143
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -154,6 +155,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- malware-apple.fr.po 13 Jul 2019 16:12:38 -0000      1.150
+++ malware-apple.fr.po 16 Jul 2019 20:29:51 -0000      1.151
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2019-07-13 18:10+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -152,6 +153,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-apple.it-diff.html  10 Jul 2019 13:00:23 -0000      1.46
+++ malware-apple.it-diff.html  16 Jul 2019 20:29:51 -0000      1.47
@@ -92,6 +92,17 @@
 Mac</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201607284"&gt;
     &lt;p&gt;The Dropbox app for Macintosh &lt;a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
@@ -169,18 +180,18 @@
     Apple <span class="removed"><del><strong>used its censorship 
system</strong></del></span> <span class="inserted"><ins><em>uses DRM 
software</em></ins></span> to <span class="removed"><del><strong>enforce Russian
 surveillance &lt;a
 
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
-by blocking distribution of the LinkedIn app</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
+by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;This is ironic because LinkedIn is a surveillance system
+itself.</strong></del></span> <span class="inserted"><ins><em>prevent people 
from charging an iThing
     with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="removed"><del><strong>Russia&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;This is ironic because LinkedIn is</strong></del></span> <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
-    focuses on the fact that</em></ins></span> a <span 
class="removed"><del><strong>surveillance system
-itself. While subjecting its users to its</strong></del></span> <span 
class="inserted"><ins><em>new model of Macbook introduced a
+    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
+    focuses on the fact that a new model of Macbook introduced a
     requirement for monitors to have malicious hardware, but DRM software
     in MacOS is involved in activating the hardware. The software for
     accessing iTunes is also responsible.&lt;/p&gt;
@@ -339,8 +350,8 @@
     
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
     by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
-    While subjecting its users to its</em></ins></span> own surveillance, it 
tries to
+    &lt;p&gt;This is ironic because LinkedIn is a surveillance system 
itself.</em></ins></span>
+    While subjecting its users to its own surveillance, it tries to
     protect its users from Russian surveillance, and is therefore subject
     to Russian censorship.&lt;/p&gt;
 
@@ -1051,7 +1062,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/10 13:00:23 $
+$Date: 2019/07/16 20:29:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- malware-apple.it.po 10 Jul 2019 13:00:23 -0000      1.127
+++ malware-apple.it.po 16 Jul 2019 20:29:51 -0000      1.128
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -173,6 +173,20 @@
 msgstr "Backdoor di Apple"
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | The Dropbox app for Macintosh <a
 # | 
[-href=\"http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\";>takes
 # | total-]

Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-apple.ja-diff.html  10 Jul 2019 13:00:23 -0000      1.59
+++ malware-apple.ja-diff.html  16 Jul 2019 20:29:51 -0000      1.60
@@ -102,6 +102,17 @@
 Mac</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201607284"&gt;
     &lt;p&gt;The Dropbox app for Macintosh &lt;a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
@@ -184,30 +195,29 @@
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
     DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
     focuses on</em></ins></span> the <span 
class="removed"><del><strong>locations</strong></del></span> <span 
class="inserted"><ins><em>fact that a new model</em></ins></span> of <span 
class="removed"><del><strong>US drone
-assassinations, giving various excuses. Each time the developers
-fixed one &ldquo;problem&rdquo;, Apple complained about another.
-After the fifth rejection,
-Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
-it was censoring</strong></del></span> <span class="inserted"><ins><em>Macbook 
introduced a
+assassinations, giving various excuses. Each time</strong></del></span> <span 
class="inserted"><ins><em>Macbook introduced a
     requirement for monitors to have malicious hardware, but DRM software
-    in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>app based</strong></del></span> <span 
class="inserted"><ins><em>hardware. The software for
+    in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>hardware. The 
software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters to Bluray disks&lt;/a&gt;.  (The article 
focused</em></ins></span> on <span class="inserted"><ins><em>Windows
-    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>subject matter&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-As</strong></del></span> <span class="inserted"><ins><em>same thing 
subsequently.)&lt;/p&gt;
+    DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
+    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>fifth rejection,</strong></del></span> <span 
class="inserted"><ins><em>same thing subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
-    &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
-    href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
-    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;iTunes videos have DRM, which allows</em></ins></span> Apple 
<span class="inserted"><ins><em>to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the app based on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its
+    customers can watch</em></ins></span> the <span 
class="removed"><del><strong>subject matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As</strong></del></span> <span class="inserted"><ins><em>videos they 
purchased&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -284,10 +294,14 @@
     
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
     a malicious web site to extract all the user's messaging <span 
class="removed"><del><strong>history&lt;/a&gt;.
     &lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>history&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>history&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span>
 
-  &lt;li id="M201311120"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
@@ -296,13 +310,13 @@
     the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="inserted"><ins><em>&lt;!--</em></ins></span>
+&lt;!--
 &lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</em></ins></span> to qualify 
 for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
 interference.&lt;/p&gt;
 
@@ -313,30 +327,30 @@
 &lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS, the operating system</em></ins></span> of <span 
class="removed"><del><strong>iThings</strong></del></span> <span 
class="inserted"><ins><em>the Apple iThings, is the prototype
+iOS, the operating system of the Apple iThings, is the prototype
 of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
-designing general purpose computers with censorship of application
+designing general purpose computers with censorship</em></ins></span> of <span 
class="inserted"><ins><em>application
 programs.&lt;/p&gt;
 
 &lt;p&gt;Here is an article about the &lt;a
 href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
+code signing&lt;/a&gt; that the</em></ins></span> iThings <span 
class="inserted"><ins><em>use to lock up the user.&lt;/p&gt;
 
-&lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>allow limited passage through the
+&lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
 walls of the iThing jail: users can now install apps built from
 source code, provided the source code is written in Swift.  Users
-cannot do this freely because they are required to identify
+cannot do this freely because they are required</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="inserted"><ins><em>crack in the prison walls, it is not
+are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>crack in the prison walls, it is not
 big enough to mean that the iThings are no longer jails.&lt;/p&gt;
 
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
-    href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
-    ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
+    &lt;p&gt;Users caught in the jail of an iMonster are</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html"&gt;
 sitting
+    ducks for other attackers&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>app censorship prevents security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
@@ -362,9 +376,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship</em></ins></span> system <span 
class="removed"><del><strong>upgrade</strong></del></span> <span 
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
-    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
+    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
     While subjecting its users to its own surveillance, it tries to
@@ -997,7 +1011,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/10 13:00:23 $
+$Date: 2019/07/16 20:29:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- malware-apple.ja.po 10 Jul 2019 13:00:23 -0000      1.110
+++ malware-apple.ja.po 16 Jul 2019 20:29:51 -0000      1.111
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -152,6 +152,20 @@
 msgstr "Appleのバックドア"
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";

Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-apple.nl-diff.html  10 Jul 2019 13:00:23 -0000      1.63
+++ malware-apple.nl-diff.html  16 Jul 2019 20:29:51 -0000      1.64
@@ -102,6 +102,17 @@
 Mac</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201607284"&gt;
     &lt;p&gt;The Dropbox app for Macintosh &lt;a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
@@ -184,30 +195,29 @@
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
     DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
     focuses on</em></ins></span> the <span 
class="removed"><del><strong>locations</strong></del></span> <span 
class="inserted"><ins><em>fact that a new model</em></ins></span> of <span 
class="removed"><del><strong>US drone
-assassinations, giving various excuses. Each time the developers
-fixed one &ldquo;problem&rdquo;, Apple complained about another.
-After the fifth rejection,
-Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
-it was censoring</strong></del></span> <span class="inserted"><ins><em>Macbook 
introduced a
+assassinations, giving various excuses. Each time</strong></del></span> <span 
class="inserted"><ins><em>Macbook introduced a
     requirement for monitors to have malicious hardware, but DRM software
-    in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>app based</strong></del></span> <span 
class="inserted"><ins><em>hardware. The software for
+    in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>hardware. The 
software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters to Bluray disks&lt;/a&gt;.  (The article 
focused</em></ins></span> on <span class="inserted"><ins><em>Windows
-    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>subject matter&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-As</strong></del></span> <span class="inserted"><ins><em>same thing 
subsequently.)&lt;/p&gt;
+    DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
+    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>fifth rejection,</strong></del></span> <span 
class="inserted"><ins><em>same thing subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
-    &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
-    href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
-    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;iTunes videos have DRM, which allows</em></ins></span> Apple 
<span class="inserted"><ins><em>to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the app based on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its
+    customers can watch</em></ins></span> the <span 
class="removed"><del><strong>subject matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As</strong></del></span> <span class="inserted"><ins><em>videos they 
purchased&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -284,10 +294,14 @@
     
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
     a malicious web site to extract all the user's messaging <span 
class="removed"><del><strong>history&lt;/a&gt;.
     &lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>history&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>history&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span>
 
-  &lt;li id="M201311120"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
@@ -296,13 +310,13 @@
     the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="inserted"><ins><em>&lt;!--</em></ins></span>
+&lt;!--
 &lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</em></ins></span> to qualify 
 for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
 interference.&lt;/p&gt;
 
@@ -313,30 +327,30 @@
 &lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS, the operating system</em></ins></span> of <span 
class="removed"><del><strong>iThings</strong></del></span> <span 
class="inserted"><ins><em>the Apple iThings, is the prototype
+iOS, the operating system of the Apple iThings, is the prototype
 of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
-designing general purpose computers with censorship of application
+designing general purpose computers with censorship</em></ins></span> of <span 
class="inserted"><ins><em>application
 programs.&lt;/p&gt;
 
 &lt;p&gt;Here is an article about the &lt;a
 href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
+code signing&lt;/a&gt; that the</em></ins></span> iThings <span 
class="inserted"><ins><em>use to lock up the user.&lt;/p&gt;
 
-&lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>allow limited passage through the
+&lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
 walls of the iThing jail: users can now install apps built from
 source code, provided the source code is written in Swift.  Users
-cannot do this freely because they are required to identify
+cannot do this freely because they are required</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="inserted"><ins><em>crack in the prison walls, it is not
+are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>crack in the prison walls, it is not
 big enough to mean that the iThings are no longer jails.&lt;/p&gt;
 
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
-    href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
-    ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
+    &lt;p&gt;Users caught in the jail of an iMonster are</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html"&gt;
 sitting
+    ducks for other attackers&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>app censorship prevents security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
@@ -362,9 +376,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship</em></ins></span> system <span 
class="removed"><del><strong>upgrade</strong></del></span> <span 
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
-    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
+    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
     While subjecting its users to its own surveillance, it tries to
@@ -997,7 +1011,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/10 13:00:23 $
+$Date: 2019/07/16 20:29:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-apple.nl.po 10 Jul 2019 13:00:23 -0000      1.63
+++ malware-apple.nl.po 16 Jul 2019 20:29:51 -0000      1.64
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -166,6 +166,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-apple.pot   10 Jul 2019 13:00:23 -0000      1.75
+++ malware-apple.pot   16 Jul 2019 20:29:51 -0000      1.76
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -122,6 +122,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a "
+"href=\"https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/\";> "
+"there is a back door in MacOS</a> for automatically updating some (all?) "
+"apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a "
 
"href=\"http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\";>
 "
 "takes control of user interface items after luring the user into entering an "

Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- malware-apple.ru.po 10 Jul 2019 13:00:23 -0000      1.204
+++ malware-apple.ru.po 16 Jul 2019 20:29:51 -0000      1.205
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2019-01-29 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -149,6 +150,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- nl.po       15 Jul 2019 10:02:20 -0000      1.108
+++ nl.po       16 Jul 2019 20:29:51 -0000      1.109
@@ -658,6 +658,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- pl.po       15 Jul 2019 10:02:21 -0000      1.108
+++ pl.po       16 Jul 2019 20:29:51 -0000      1.109
@@ -644,6 +644,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- pot 15 Jul 2019 10:02:22 -0000      1.107
+++ pot 16 Jul 2019 20:29:51 -0000      1.108
@@ -506,6 +506,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-back-doors.de-diff.html 27 Jun 2019 08:02:22 -0000      1.29
+++ proprietary-back-doors.de-diff.html 16 Jul 2019 20:29:51 -0000      1.30
@@ -297,6 +297,17 @@
 &lt;h3 <span class="removed"><del><strong>id="install-delete"&gt;Installing 
or</strong></del></span> <span 
class="inserted"><ins><em>id='install-delete'&gt;Installing,</em></ins></span> 
deleting <span class="inserted"><ins><em>or disabling</em></ins></span> 
programs&lt;/h3&gt;
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201811100"&gt;
     &lt;p&gt;Corel Paintshop Pro has a &lt;a
     
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
@@ -359,13 +370,10 @@
     &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;In Android,</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
-    &lt;p&gt; In addition to its</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-      Google</strong></del></span> <span 
class="inserted"><ins><em>href="#windows-update"&gt;universal back
+    &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
     door&lt;/a&gt;, Windows 8 has a back door for &lt;a
     
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
@@ -377,10 +385,11 @@
     way.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201103070"&gt;
+  &lt;li id="M201103070"&gt;</em></ins></span>
     &lt;p&gt;In Android, &lt;a
-    
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google</em></ins></span> has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.</em></ins></span> (It was in a
+      <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;</em></ins></span>
+    Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.</em></ins></span> (It was in a
     program called GTalkService, which seems since then to have been
     merged into Google Play.)&lt;/p&gt;
 
@@ -392,24 +401,24 @@
 
     &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
     malicious so far, the point is that nobody should have such power,
-    which could also be used maliciously.  You might well decide to
-    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for allowing it to
-    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
-    who (if anyone) to trust in this way.&lt;/p&gt;
+    which could <span class="removed"><del><strong>also be used maliciously.  
You might well decide to let a
+      security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that 
it
+      considers malicious.  But there is no excuse for allowing it
+      to &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the 
right to
+      decide who (if anyone) to trust in this way.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
+  &lt;li&gt;
     &lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
       Windows 8 also has a back door for remotely deleting 
apps&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;You might well decide to let a security service that you trust
-      remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
-      But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, 
and you
-      should have the right to decide whom (if anyone) to trust in this
-      way.&lt;/p&gt;
+    &lt;p&gt;You</strong></del></span> <span class="inserted"><ins><em>also be 
used maliciously.  You</em></ins></span> might well decide to
+    let a security service <span class="removed"><del><strong>that you 
trust</strong></del></span> remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
+    it considers malicious.  But there is no excuse for <span 
class="removed"><del><strong>&lt;em&gt;deleting&lt;/em&gt;</strong></del></span>
 <span class="inserted"><ins><em>allowing it to
+    &lt;em&gt;delete&lt;/em&gt;</em></ins></span> the programs, and you should 
have the right to decide <span 
class="removed"><del><strong>whom</strong></del></span>
+    <span class="inserted"><ins><em>who</em></ins></span> (if anyone) to trust 
in this way.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
     &lt;p&gt;The iPhone has a back door &lt;a
@@ -787,7 +796,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 08:02:22 $
+$Date: 2019/07/16 20:29:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary-back-doors.de.po        27 Jun 2019 08:02:22 -0000      1.128
+++ proprietary-back-doors.de.po        16 Jul 2019 20:29:51 -0000      1.129
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -508,6 +508,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-back-doors.es.po        1 Jul 2019 09:07:07 -0000       1.16
+++ proprietary-back-doors.es.po        16 Jul 2019 20:29:51 -0000      1.17
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2019-07-01 10:55+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -414,6 +415,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary-back-doors.fr.po        27 Jun 2019 09:14:42 -0000      1.136
+++ proprietary-back-doors.fr.po        16 Jul 2019 20:29:51 -0000      1.137
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2019-06-27 11:13+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -415,6 +416,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-back-doors.it-diff.html 27 Jun 2019 08:02:22 -0000      1.56
+++ proprietary-back-doors.it-diff.html 16 Jul 2019 20:29:51 -0000      1.57
@@ -270,50 +270,62 @@
     &lt;p&gt;It is used</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
     remotely erase books&lt;/a&gt;.  One of the books erased was
-    &lt;cite&gt;1984&lt;/cite&gt;,</em></ins></span> by <span 
class="removed"><del><strong>14,000 Android applications.&lt;/p&gt;
-  &lt;/li&gt;
-  
-&lt;li&gt;&lt;p&gt;ARRIS cable modem has a</strong></del></span> <span 
class="inserted"><ins><em>George Orwell.&lt;/p&gt;
+    &lt;cite&gt;1984&lt;/cite&gt;,</em></ins></span> by <span 
class="removed"><del><strong>14,000 Android 
applications.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>George Orwell.&lt;/p&gt;
 
     &lt;p&gt;Amazon responded to criticism by saying it
     would delete books only following orders from the
-    state.  However, that policy didn't last.  In 2012 it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
+    state.  However, that policy didn't last.  In 2012 it &lt;a
+    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
     wiped a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then
     offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Do other ebook readers have back doors</em></ins></span> in <span 
class="removed"><del><strong>the 
backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
+    &lt;p&gt;Do other ebook readers have back doors in their nonfree software? 
We
     don't know, and we have no way to find out.  There is no reason to
     assume that they don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Caterpillar vehicles 
come with</strong></del></span>
+  
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable 
modem</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201011220"&gt;
-    &lt;p&gt;The iPhone has a back door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff the engine&lt;/a&gt;
-     remotely.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;The iPhone</em></ins></span> has a <span 
class="inserted"><ins><em>back door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
     remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
     enabling it without understanding.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Mac OS X had an</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Caterpillar vehicles 
come with
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears</em></ins></span> to <span 
class="removed"><del><strong>shutoff the engine&lt;/a&gt;
+     remotely.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;li&gt;&lt;p&gt;
+Mac OS X had an</strong></del></span> <span class="inserted"><ins><em>say 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;</em></ins></span>
-    back door <span class="removed"><del><strong>for 4 years&lt;/a&gt;.
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a</em></ins></span> back door <span class="inserted"><ins><em>in 
MacOS&lt;/a&gt;</em></ins></span> for <span class="removed"><del><strong>4 
years&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> that <span 
class="removed"><del><strong>&lt;a 
-    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them</strong></del></span> <span 
class="inserted"><ins><em>can make it cease</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7</strong></del></span> <span 
class="inserted"><ins><em>function&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> <span 
class="inserted"><ins><em>automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but</em></ins></span> that <span 
class="inserted"><ins><em>is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7</strong></del></span> <span 
class="inserted"><ins><em>function&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article is full of confusions, errors</em></ins></span> and 
<span class="removed"><del><strong>8 with all-spying 
     Windows 10&lt;/a&gt;.&lt;/p&gt;
@@ -342,107 +354,93 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Most mobile phones have a universal</strong></del></span> <span 
class="inserted"><ins><em>using the</em></ins></span> back <span 
class="removed"><del><strong>door, which has been used</strong></del></span> 
<span class="inserted"><ins><em>door is always wrong too. No software
-    developer should have that power over users.&lt;/li&gt;
-
-    &lt;li&gt;&ldquo;&lt;a
-    href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
-    attacking ships. Using that word</em></ins></span> to
-<span class="removed"><del><strong>&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+&lt;p&gt;Most mobile phones have a universal</strong></del></span> <span 
class="inserted"><ins><em>using the</em></ins></span> back <span 
class="removed"><del><strong>door, which has been used to
+&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
 turn them malicious&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android has</strong></del></span> <span 
class="inserted"><ins><em>refer to sharing copies is</em></ins></span> a <span 
class="removed"><del><strong>universal back door&lt;/a&gt;. Nearly all
+A Chinese version of Android has</strong></del></span> <span 
class="inserted"><ins><em>door is always wrong too. No software
+    developer should have that power over users.&lt;/li&gt;
+
+    &lt;li&gt;&ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
+    attacking ships. Using that word to refer to sharing copies 
is</em></ins></span> a <span class="removed"><del><strong>universal back 
door&lt;/a&gt;. Nearly all
 models</strong></del></span> <span class="inserted"><ins><em>smear;
     please don't smear sharing.&lt;/li&gt;
 
     &lt;li&gt;&lt;p&gt;The idea</em></ins></span> of <span 
class="removed"><del><strong>mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;protecting our IP&rdquo; is
     total confusion. The term &ldquo;IP&rdquo; itself is</em></ins></span> a 
<span class="removed"><del><strong>universal back door</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     href="/philosophy/not-ipr.html"&gt;bogus generalization about things
-    that have nothing</em></ins></span> in <span 
class="inserted"><ins><em>common&lt;/a&gt;.&lt;/p&gt;
+    that have nothing</em></ins></span> in <span 
class="removed"><del><strong>the modem chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>common&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
-    generalization is a separate absurdity. It's like 
calling</em></ins></span> the <span class="removed"><del><strong>modem chip. So
-why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>cops
-    because neighbors' kids are playing on your front yard, and saying
-    that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm</em></ins></span>
-    to <span class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>the boundary line, 
not even with a jackhammer, because it</em></ins></span> is <span 
class="removed"><del><strong>controlled</strong></del></span> <span 
class="inserted"><ins><em>an
-    abstraction and can't be affected</em></ins></span> by <span 
class="removed"><del><strong>Coolpad.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>physical 
action.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;In addition,</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>speak of 
&ldquo;protecting&rdquo; that bogus
+    generalization</em></ins></span> is <span 
class="removed"><del><strong>controlled
+by Coolpad.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Microsoft Windows has</strong></del></span> a <span 
class="removed"><del><strong>universal back door through which
+&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever can be imposed on</strong></del></span> <span 
class="inserted"><ins><em>separate absurdity. It's like 
calling</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;More information</strong></del></span> <span 
class="inserted"><ins><em>cops
+    because neighbors' kids are playing</em></ins></span> on <span 
class="removed"><del><strong>when
+&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+this was used&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;In Windows 10,</strong></del></span> <span 
class="inserted"><ins><em>your front yard, and saying
+    that you're &ldquo;protecting</em></ins></span> the <span 
class="removed"><del><strong>universal back door</strong></del></span> <span 
class="inserted"><ins><em>boundary line&rdquo;. The kids can't do harm
+    to the boundary line, not even with a jackhammer, because 
it</em></ins></span> is <span class="removed"><del><strong>no longer hidden; all
+&ldquo;upgrades&rdquo; will
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>an
+    abstraction</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>can't be 
affected by physical action.&lt;/p&gt;&lt;/li&gt;
     &lt;/ul&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Microsoft Windows</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;German 
government</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+away from Windows 8 computers with TPM 2.0 due</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article for the facts it presents. It
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>potential back
+door capabilities of</strong></del></span> the <span 
class="removed"><del><strong>TPM 2.0 
chip&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article for the facts it presents. It
     is too bad that the article finishes by advocating the
     moral weakness of surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus,</em></ins></span> 
has a <span class="removed"><del><strong>universal</strong></del></span> back 
door <span class="removed"><del><strong>through which</strong></del></span> 
<span class="inserted"><ins><em>that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;</em></ins></span>
-    can <span class="removed"><del><strong>be imposed on the users&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;More information on when
-&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-this was used&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;In Windows 10, the universal back door</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;upload files&rdquo; as well as forcibly install
-    apps&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>no 
longer hidden; all
-&ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
-and immediately imposed&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>used by 
14,000 Android applications.&lt;/p&gt;</em></ins></span>
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;German 
government</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The iPhone</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
-    &lt;p&gt; In addition to its</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-away from</strong></del></span> <span 
class="inserted"><ins><em>href="#windows-update"&gt;universal back
-    door&lt;/a&gt;,</em></ins></span> Windows 8 <span 
class="removed"><del><strong>computers with TPM 2.0 due to potential back
-door capabilities of the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus,</em></ins></span> 
has a back door
+<span class="removed"><del><strong>&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
 that <span class="removed"><del><strong>allows Apple to remotely delete 
apps&lt;/a&gt; which Apple considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
+because of course we</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;</em></ins></span>
+    can <span class="removed"><del><strong>trust Apple.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&ldquo;upload 
files&rdquo; as well as forcibly install
+    apps&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;The iPhone</strong></del></span> has a back door <span 
class="inserted"><ins><em>for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-that allows Apple</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
-    remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;You might well decide</em></ins></span> to <span 
class="inserted"><ins><em>let a security service that you 
trust</em></ins></span>
-    remotely <span class="removed"><del><strong>delete apps&lt;/a&gt; which 
Apple</strong></del></span> <span 
class="inserted"><ins><em>&lt;em&gt;deactivate&lt;/em&gt; programs that 
it</em></ins></span> considers
-<span class="removed"><del><strong>&ldquo;inappropriate&rdquo;.  Jobs said 
it's ok</strong></del></span> <span class="inserted"><ins><em>malicious.
-    But there is no excuse</em></ins></span> for <span 
class="removed"><del><strong>Apple to</strong></del></span> <span 
class="inserted"><ins><em>&lt;em&gt;deleting&lt;/em&gt; the programs, and you
-    should</em></ins></span> have <span class="removed"><del><strong>this power
-because of course we can</strong></del></span> <span 
class="inserted"><ins><em>the right to decide whom (if anyone) 
to</em></ins></span> trust <span class="removed"><del><strong>Apple.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>in this
-    way.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It is used by 14,000 Android 
applications.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;The iPhone</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;
-    &lt;p&gt;In Android, &lt;a
-    
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google</em></ins></span> has a back door <span 
class="removed"><del><strong>for
-&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
+    &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
+    door&lt;/a&gt;, Windows 8</em></ins></span> has a back door for &lt;a 
<span 
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
 remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
 it without understanding.
 &lt;/p&gt;
@@ -450,46 +448,77 @@
 
 &lt;li&gt;
   &lt;p&gt;Apple can, and regularly does,
-    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>to</em></ins></span> remotely <span 
class="removed"><del><strong>extract some data from iPhones for the 
state&lt;/a&gt;.
+    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
   &lt;/p&gt;
-  &lt;p&gt;This may</strong></del></span> <span 
class="inserted"><ins><em>delete apps&lt;/a&gt;. (It was in a
-    program called GTalkService, which seems since then to</em></ins></span> 
have <span class="removed"><del><strong>improved with
+  &lt;p&gt;This may have improved with
   &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>been
-    merged into Google Play.)&lt;/p&gt;
-
-    &lt;p&gt;Google can also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  This 
is</em></ins></span>
-    not <span class="removed"><del><strong>as much as Apple 
claims&lt;/a&gt;.&lt;/p&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
-Windows 8 also has</strong></del></span> <span 
class="inserted"><ins><em>equivalent to</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door for remotely deleting apps&lt;/a&gt;.
+Windows 8 also has a back door for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
+    remotely deleting <span class="removed"><del><strong>apps&lt;/a&gt;.
 &lt;/p&gt;
 
-&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>door, but 
permits various dirty
-    tricks.&lt;/p&gt;
+&lt;p&gt;
+You</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
-    malicious so far, the point is that nobody should have such power,
-    which could also be used maliciously.</em></ins></span>  You might well 
decide to
-    let a security service <span class="removed"><del><strong>that you 
trust</strong></del></span> remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for <span 
class="removed"><del><strong>&lt;em&gt;deleting&lt;/em&gt;</strong></del></span>
 <span class="inserted"><ins><em>allowing it to
-    &lt;em&gt;delete&lt;/em&gt;</em></ins></span> the programs, and you should 
have the right to decide
-    who (if anyone) to trust in this <span class="removed"><del><strong>way.
+    &lt;p&gt;You</em></ins></span> might well decide to let a security service 
that you trust
+    remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
+    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
+    should have the right to decide <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this 
<span class="removed"><del><strong>way.
+&lt;/p&gt;
+
+&lt;p&gt;
+As these pages show, if you do want to clean your computer of malware,
+the first software to delete is Windows or iOS.
+&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;</em></ins></span>
+    &lt;p&gt;In Android, &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;</em></ins></span>
+    Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.</em></ins></span> (It <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> in a
+    program called <span class="removed"><del><strong>GTalkService).
+&lt;/p&gt;
+
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>GTalkService, 
which seems since then to have been
+    merged into</em></ins></span> Google <span 
class="inserted"><ins><em>Play.)&lt;/p&gt;
+
+    &lt;p&gt;Google</em></ins></span> can also &lt;a
+    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+    forcibly and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which
+seems, since that article, to have been merged into Google 
Play).</strong></del></span> <span 
class="inserted"><ins><em>GTalkService.</em></ins></span>  This is
+    not equivalent to a universal back <span 
class="removed"><del><strong>door, but permits various
+dirty tricks.
 &lt;/p&gt;
 
 &lt;p&gt;
-As these pages show, if you do want</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
+Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various dirty
+    tricks.&lt;/p&gt;
+
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
+    malicious so far, the point is that nobody should have such power,
+    which could also be used maliciously.  You might well decide to
+    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
+    it considers malicious.  But there is no excuse for allowing it to
+    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
+    who (if anyone) to trust in this way.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200808110"&gt;
     &lt;p&gt;The iPhone has a back door &lt;a
     
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-    that allows Apple</em></ins></span> to <span 
class="removed"><del><strong>clean your computer</strong></del></span> <span 
class="inserted"><ins><em>remotely delete apps&lt;/a&gt; which Apple considers
+    that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
     &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
     this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
@@ -500,26 +529,21 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature</em></ins></span> of <span 
class="removed"><del><strong>malware,</strong></del></span> <span 
class="inserted"><ins><em>some Ford vehicles has &lt;a
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to</em></ins></span> the <span 
class="removed"><del><strong>first software</strong></del></span> <span 
class="inserted"><ins><em>internal car network&lt;/a&gt;. It is constantly
-    connected</em></ins></span> to <span 
class="removed"><del><strong>delete</strong></del></span> <span 
class="inserted"><ins><em>the cellular phone network and sends Ford a lot of 
data,
+    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
+    connected to the cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
-    key</em></ins></span> is <span 
class="removed"><del><strong>Windows</strong></del></span> <span 
class="inserted"><ins><em>removed, and users report that they can't disable 
it.&lt;/p&gt;
+    key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
-    connectivity by disconnecting the cellular modem,</em></ins></span> or 
<span class="removed"><del><strong>iOS.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>wrapping the
-    antenna in aluminum foil?&lt;/p&gt;</em></ins></span>
+    connectivity by disconnecting the cellular modem, or wrapping the
+    antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;In Android,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-Google</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
+  &lt;li id="M201812300"&gt;
+    &lt;p&gt;New GM cars &lt;a
+    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
     offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Every nonfree program offers the user zero security against its
@@ -528,7 +552,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
@@ -550,9 +574,9 @@
     this limit.&lt;/p&gt;
 
     &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
-    whole battery capacity did not do them any harm, the 
same</em></ins></span> back
-    door <span class="inserted"><ins><em>would permit Tesla (perhaps under the 
command of some
-    government)</em></ins></span> to remotely <span 
class="removed"><del><strong>delete apps.&lt;/a&gt;  (It</strong></del></span> 
<span class="inserted"><ins><em>order the car to use none of its battery. Or
+    whole battery capacity did not do them any harm, the same back
+    door would permit Tesla (perhaps under the command of some
+    government) to remotely order the car to use none of its battery. Or
     perhaps to drive its passenger to a torture prison.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -568,40 +592,32 @@
     a universal back door in the application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span 
class="inserted"><ins><em>separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door</em></ins></span> in <span 
class="inserted"><ins><em>the modem processor that the local phone
+    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+    universal back door in the modem processor that the local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201608171"&gt;
     &lt;p id="windows-update"&gt;Microsoft
-    Windows has</em></ins></span> a <span class="removed"><del><strong>program
-called GTalkService).
-&lt;/p&gt;
-
-&lt;p&gt;
-Google</strong></del></span> <span class="inserted"><ins><em>universal back 
door through which &lt;a
+    Windows has a universal back door through which &lt;a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
-    any change whatsoever</em></ins></span> can <span 
class="removed"><del><strong>also</strong></del></span> <span 
class="inserted"><ins><em>be imposed on the users&lt;/a&gt;.&lt;/p&gt;
+    any change whatsoever can be imposed on the users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This was</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-forcibly</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-    reported in 2007&lt;/a&gt; for XP</em></ins></span> and <span 
class="removed"><del><strong>remotely install apps&lt;/a&gt; through 
GTalkService (which
-seems, since</strong></del></span> <span class="inserted"><ins><em>Vista, and 
it seems</em></ins></span>
-    that <span class="removed"><del><strong>article,</strong></del></span> 
<span class="inserted"><ins><em>Microsoft used the same 
method</em></ins></span> to <span class="removed"><del><strong>have been merged 
into Google Play).
-This</strong></del></span> <span class="inserted"><ins><em>push the &lt;a
+    &lt;p&gt;This was &lt;a
+    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+    reported in 2007&lt;/a&gt; for XP and Vista, and it seems
+    that Microsoft used the same method to push the &lt;a
     href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;
     Windows 10 downgrade&lt;/a&gt; to computers running Windows 7 and 
8.&lt;/p&gt;
 
-    &lt;p&gt;In Windows 10, the universal back door</em></ins></span>
-    is <span class="removed"><del><strong>not equivalent</strong></del></span> 
<span class="inserted"><ins><em>no longer hidden; all &ldquo;upgrades&rdquo; 
will be &lt;a
+    &lt;p&gt;In Windows 10, the universal back door
+    is no longer hidden; all &ldquo;upgrades&rdquo; will be &lt;a
     
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;
     forcibly and immediately imposed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606060"&gt;
-    &lt;p&gt;The Amazon Echo appears</em></ins></span> to <span 
class="inserted"><ins><em>have a universal back door, since &lt;a
+    &lt;p&gt;The Amazon Echo appears to have a universal back door, since &lt;a
     href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
     it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
 
@@ -613,12 +629,7 @@
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has</em></ins></span> a universal back <span 
class="removed"><del><strong>door, but permits various
-dirty tricks.
-&lt;/p&gt;
-
-&lt;p&gt;
-Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;. Nearly
+    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
     all models</em></ins></span> of <span class="removed"><del><strong>this 
power has not been
 malicious so far, the point is that nobody should</strong></del></span> <span 
class="inserted"><ins><em>mobile phones</em></ins></span> have <span 
class="removed"><del><strong>such power,
 which could also be used maliciously.  You might well decide to 
let</strong></del></span> a
@@ -859,7 +870,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 08:02:22 $
+$Date: 2019/07/16 20:29:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary-back-doors.it.po        27 Jun 2019 08:02:22 -0000      1.121
+++ proprietary-back-doors.it.po        16 Jul 2019 20:29:51 -0000      1.122
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -513,6 +513,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-back-doors.ja-diff.html 27 Jun 2019 08:02:22 -0000      1.54
+++ proprietary-back-doors.ja-diff.html 16 Jul 2019 20:29:51 -0000      1.55
@@ -246,50 +246,62 @@
     &lt;p&gt;It is used</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
     remotely erase books&lt;/a&gt;.  One of the books erased was
-    &lt;cite&gt;1984&lt;/cite&gt;,</em></ins></span> by <span 
class="removed"><del><strong>14,000 Android applications.&lt;/p&gt;
-  &lt;/li&gt;
-  
-&lt;li&gt;&lt;p&gt;ARRIS cable modem has a</strong></del></span> <span 
class="inserted"><ins><em>George Orwell.&lt;/p&gt;
+    &lt;cite&gt;1984&lt;/cite&gt;,</em></ins></span> by <span 
class="removed"><del><strong>14,000 Android 
applications.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>George Orwell.&lt;/p&gt;
 
     &lt;p&gt;Amazon responded to criticism by saying it
     would delete books only following orders from the
-    state.  However, that policy didn't last.  In 2012 it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
+    state.  However, that policy didn't last.  In 2012 it &lt;a
+    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
     wiped a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then
     offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Do other ebook readers have back doors</em></ins></span> in <span 
class="removed"><del><strong>the 
backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
+    &lt;p&gt;Do other ebook readers have back doors in their nonfree software? 
We
     don't know, and we have no way to find out.  There is no reason to
     assume that they don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Caterpillar vehicles 
come with</strong></del></span>
+  
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable 
modem</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201011220"&gt;
-    &lt;p&gt;The iPhone has a back door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff the engine&lt;/a&gt;
-     remotely.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;The iPhone</em></ins></span> has a <span 
class="inserted"><ins><em>back door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
     remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
     enabling it without understanding.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Mac OS X had an</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Caterpillar vehicles 
come with
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears</em></ins></span> to <span 
class="removed"><del><strong>shutoff the engine&lt;/a&gt;
+     remotely.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;li&gt;&lt;p&gt;
+Mac OS X had an</strong></del></span> <span class="inserted"><ins><em>say 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;</em></ins></span>
-    back door <span class="removed"><del><strong>for 4 years&lt;/a&gt;.
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a</em></ins></span> back door <span class="inserted"><ins><em>in 
MacOS&lt;/a&gt;</em></ins></span> for <span class="removed"><del><strong>4 
years&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> that <span 
class="removed"><del><strong>&lt;a 
-    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them</strong></del></span> <span 
class="inserted"><ins><em>can make it cease</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7</strong></del></span> <span 
class="inserted"><ins><em>function&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> <span 
class="inserted"><ins><em>automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but</em></ins></span> that <span 
class="inserted"><ins><em>is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7</strong></del></span> <span 
class="inserted"><ins><em>function&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article is full of confusions, errors</em></ins></span> and 
<span class="removed"><del><strong>8 with all-spying 
     Windows 10&lt;/a&gt;.&lt;/p&gt;
@@ -323,21 +335,22 @@
 
     &lt;li&gt;&ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
-    attacking ships. Using that word</em></ins></span> to <span 
class="inserted"><ins><em>refer to sharing copies is a smear;
-    please don't smear sharing.&lt;/li&gt;
-
-    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
-    total confusion. The term &ldquo;IP&rdquo; itself is a</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+    attacking ships. Using that word</em></ins></span> to
+<span class="removed"><del><strong>&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
 turn them malicious&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly all
-models of mobile phones</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/not-ipr.html"&gt;bogus 
generalization about things
-    that</em></ins></span> have <span class="removed"><del><strong>a universal 
back door</strong></del></span> <span 
class="inserted"><ins><em>nothing</em></ins></span> in <span 
class="removed"><del><strong>the modem chip. So
+A Chinese version of Android has</strong></del></span> <span 
class="inserted"><ins><em>refer to sharing copies is</em></ins></span> a <span 
class="removed"><del><strong>universal back door&lt;/a&gt;. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>smear;
+    please don't smear sharing.&lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The idea</em></ins></span> of <span 
class="removed"><del><strong>mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is</em></ins></span> a 
<span class="removed"><del><strong>universal back door</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    that have nothing</em></ins></span> in <span 
class="removed"><del><strong>the modem chip. So
 why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>common&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;In addition,</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>speak of 
&ldquo;protecting&rdquo; that bogus
@@ -356,37 +369,29 @@
 &lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
 this was used&lt;/a&gt;.
 &lt;/p&gt;
-&lt;p&gt;In Windows 10, the universal back door is no longer hidden; all
+&lt;p&gt;In Windows 10,</strong></del></span> <span 
class="inserted"><ins><em>your front yard, and saying
+    that you're &ldquo;protecting</em></ins></span> the <span 
class="removed"><del><strong>universal back door</strong></del></span> <span 
class="inserted"><ins><em>boundary line&rdquo;. The kids can't do harm
+    to the boundary line, not even with a jackhammer, because 
it</em></ins></span> is <span class="removed"><del><strong>no longer hidden; all
 &ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>your front yard,</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Windows 8's back doors are so gaping</strong></del></span> <span 
class="inserted"><ins><em>saying</em></ins></span>
-    that
-<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>you're &ldquo;protecting</em></ins></span> the 
<span class="removed"><del><strong>German government has 
decided</strong></del></span> <span class="inserted"><ins><em>boundary 
line&rdquo;. The kids can't do harm
-    to the boundary line, not even with a jackhammer, 
because</em></ins></span> it <span class="inserted"><ins><em>is an
-    abstraction and</em></ins></span> can't be <span 
class="removed"><del><strong>trusted&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>affected by 
physical action.&lt;/p&gt;&lt;/li&gt;
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>an
+    abstraction</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>can't be 
affected by physical action.&lt;/p&gt;&lt;/li&gt;
     &lt;/ul&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The iPhone has a back door
-&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
+&lt;p&gt;Windows 8's back doors are so gaping</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>allows Apple</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades</em></ins></span> that
+<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
-&ldquo;inappropriate&rdquo;.  Jobs said it's ok</strong></del></span> <span 
class="inserted"><ins><em>the article</em></ins></span> for <span 
class="removed"><del><strong>Apple to have this power
-because</strong></del></span> <span class="inserted"><ins><em>the facts it 
presents. It
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>German government has 
decided</strong></del></span> <span class="inserted"><ins><em>article for the 
facts</em></ins></span> it <span class="removed"><del><strong>can't be 
trusted&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>presents. It
     is too bad that the article finishes by advocating the
-    moral weakness</em></ins></span> of <span 
class="removed"><del><strong>course we can trust Apple.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>surrendering 
to Netflix. The Netflix app &lt;a
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -395,8 +400,24 @@
 &lt;p&gt;The iPhone</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus,</em></ins></span> 
has a back door <span class="removed"><del><strong>for
-&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus,</em></ins></span> 
has a back door
+<span class="removed"><del><strong>&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
 that <span class="removed"><del><strong>allows Apple to remotely delete 
apps&lt;/a&gt; which Apple considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
+because of course we</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;</em></ins></span>
+    can <span class="removed"><del><strong>trust Apple.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&ldquo;upload 
files&rdquo; as well as forcibly install
+    apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is used by 14,000 Android 
applications.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The iPhone</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
+    &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
+    door&lt;/a&gt;, Windows 8</em></ins></span> has a back door for &lt;a 
<span 
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
 remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
 it without understanding.
 &lt;/p&gt;
@@ -409,23 +430,16 @@
   &lt;/p&gt;
   &lt;p&gt;This may have improved with
   &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-    can &ldquo;upload files&rdquo;</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>well</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>forcibly install
-    apps&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It is used by 14,000 Android 
applications.&lt;/p&gt;</em></ins></span>
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
-    &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
-    door&lt;/a&gt;,</em></ins></span> Windows 8 <span 
class="removed"><del><strong>also</strong></del></span> has a back door for 
<span class="inserted"><ins><em>&lt;a
-    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+Windows 8 also has a back door for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
     remotely deleting <span class="removed"><del><strong>apps&lt;/a&gt;.
 &lt;/p&gt;
 
@@ -827,7 +841,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/27 08:02:22 $
+$Date: 2019/07/16 20:29:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary-back-doors.ja.po        27 Jun 2019 08:02:22 -0000      1.102
+++ proprietary-back-doors.ja.po        16 Jul 2019 20:29:51 -0000      1.103
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -389,6 +389,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-back-doors.pot  27 Jun 2019 08:02:22 -0000      1.70
+++ proprietary-back-doors.pot  16 Jul 2019 20:29:52 -0000      1.71
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -289,6 +289,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a "
+"href=\"https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/\";> "
+"there is a back door in MacOS</a> for automatically updating some (all?) "
+"apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a "
 
"href=\"https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/\";>
 "
 "back door that can make it cease to function</a>."

Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary-back-doors.ru.po        27 Jun 2019 14:00:28 -0000      1.185
+++ proprietary-back-doors.ru.po        16 Jul 2019 20:29:52 -0000      1.186
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2018-11-13 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -404,6 +405,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary.de-diff.html    15 Jul 2019 10:02:25 -0000      1.104
+++ proprietary.de-diff.html    16 Jul 2019 20:29:52 -0000      1.105
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -126,12 +126,12 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -161,10 +161,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -186,6 +186,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
@@ -242,23 +253,6 @@
     href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
     with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
-    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
-    fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -319,7 +313,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:25 $
+$Date: 2019/07/16 20:29:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.de.po   15 Jul 2019 10:02:25 -0000      1.146
+++ proprietary.de.po   16 Jul 2019 20:29:52 -0000      1.147
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -439,6 +439,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -508,25 +522,6 @@
 "protect users' privacy."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary.es.po   15 Jul 2019 10:02:25 -0000      1.181
+++ proprietary.es.po   16 Jul 2019 20:29:52 -0000      1.182
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -304,6 +304,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -405,39 +419,6 @@
 "icecat/\">IceCat</a>, una versión modificada de Firefox con algunos cambios "
 "para proteger la privacidad de los usuarios."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-"A pesar del supuesto compromiso de Apple con la privacidad, hay aplicaciones "
-"para el iPhone que contienen rastreadores que funcionan por la noche y <a "
-"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-";
-"night-do-you-know-who-your-iphone-is-talking-to/\">envían información "
-"personal del usuario a terceras partes</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-"El artículo menciona ejemplos concretos: Microsoft OneDrive, el Mint de "
-"Intuit, Nike, Spotify, The Washington Post, The Weather Channel (propiedad "
-"de IBM), el servicio de alerta criminal Citizen, Yelp y DoorDash. Pero es "
-"probable que la mayoría de las aplicaciones que no son libres contengan "
-"rastreadores. Algunas de ellas envían datos de identificación personal 
tales "
-"como la huella digital telefónica, la localización exacta, la dirección de 
"
-"correo electrónico, el número de teléfono o incluso la dirección de 
entrega "
-"(en el caso de DoorDash). Una vez que la compañía ha recogido esta "
-"información, no hay manera de saber para qué va a utilizarla."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -517,6 +498,40 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+#~ "trackers that are busy at night <a href=\"https://freediggz.";
+#~ "com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-"
+#~ "your-iphone-is-talking-to/\"> sending users' personal information to "
+#~ "third parties</a>."
+#~ msgstr ""
+#~ "A pesar del supuesto compromiso de Apple con la privacidad, hay "
+#~ "aplicaciones para el iPhone que contienen rastreadores que funcionan por "
+#~ "la noche y <a href=\"https://freediggz.com/2019/05/28/perspective-its-the-";
+#~ "middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\">envían "
+#~ "información personal del usuario a terceras partes</a>."
+
+#~ msgid ""
+#~ "The article mentions specific examples: Microsoft OneDrive, Intuit’s "
+#~ "Mint, Nike, Spotify, The Washington Post, The Weather Channel (owned by "
+#~ "IBM), the crime-alert service Citizen, Yelp and DoorDash. But it is "
+#~ "likely that most nonfree apps contain trackers. Some of these send "
+#~ "personally identifying data such as phone fingerprint, exact location, "
+#~ "email address, phone number or even delivery address (in the case of "
+#~ "DoorDash). Once this information is collected by the company, there is no "
+#~ "telling what it will be used for."
+#~ msgstr ""
+#~ "El artículo menciona ejemplos concretos: Microsoft OneDrive, el Mint de "
+#~ "Intuit, Nike, Spotify, The Washington Post, The Weather Channel "
+#~ "(propiedad de IBM), el servicio de alerta criminal Citizen, Yelp y "
+#~ "DoorDash. Pero es probable que la mayoría de las aplicaciones que no son "
+#~ "libres contengan rastreadores. Algunas de ellas envían datos de "
+#~ "identificación personal tales como la huella digital telefónica, la "
+#~ "localización exacta, la dirección de correo electrónico, el número de "
+#~ "teléfono o incluso la dirección de entrega (en el caso de DoorDash). Una 
"
+#~ "vez que la compañía ha recogido esta información, no hay manera de 
saber "
+#~ "para qué va a utilizarla."
+
+#~ msgid ""
 #~ "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 #~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
 #~ "by-anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary.fr.po   15 Jul 2019 11:32:42 -0000      1.225
+++ proprietary.fr.po   16 Jul 2019 20:29:52 -0000      1.226
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2019-07-15 13:32+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -299,6 +300,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -406,40 +421,6 @@
 "software/icecat/\">IceCat</a>, une version de Firefox avec plusieurs "
 "modifications améliorant la protection de la vie privée."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-"En dépit de l'engagement supposé d'Apple sur la confidentialité, les 
applis "
-"de l'iPhone contiennent des pisteurs qui sont très occupés la nuit à <a 
href="
-"\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-";
-"do-you-know-who-your-iphone-is-talking-to/\">envoyer des données "
-"personnelles de l'utilisateur à des tiers</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-"L'article donne des exemples particuliers : Microsoft OneDrive, Mint "
-"(division d'Intuit), Nike, Spotify, le Washington Post, le Weather Channel "
-"(propriété d'IBM), le service Citizen d'alerte sur les délits, Yelp et "
-"DoorDash. Mais il est probable que la plupart des applis non libres "
-"contiennent des pisteurs. Certains envoient des informations permettant "
-"d'identifier la personne, comme l'empreinte du téléphone, sa localisation "
-"exacte, l'adresse de courriel et le numéro de téléphone de l'utilisateur, 
ou "
-"même une adresse de livraison (dans le cas de DoorDash). Une fois que cette "
-"information a été collectée par la société, les paris sont ouverts 
quant à "
-"son utilisation."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,3 +494,37 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+#~ "trackers that are busy at night <a href=\"https://freediggz.";
+#~ "com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-"
+#~ "your-iphone-is-talking-to/\"> sending users' personal information to "
+#~ "third parties</a>."
+#~ msgstr ""
+#~ "En dépit de l'engagement supposé d'Apple sur la confidentialité, les "
+#~ "applis de l'iPhone contiennent des pisteurs qui sont très occupés la 
nuit "
+#~ "à <a href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-";
+#~ "of-the-night-do-you-know-who-your-iphone-is-talking-to/\">envoyer des "
+#~ "données personnelles de l'utilisateur à des tiers</a>."
+
+#~ msgid ""
+#~ "The article mentions specific examples: Microsoft OneDrive, Intuit’s "
+#~ "Mint, Nike, Spotify, The Washington Post, The Weather Channel (owned by "
+#~ "IBM), the crime-alert service Citizen, Yelp and DoorDash. But it is "
+#~ "likely that most nonfree apps contain trackers. Some of these send "
+#~ "personally identifying data such as phone fingerprint, exact location, "
+#~ "email address, phone number or even delivery address (in the case of "
+#~ "DoorDash). Once this information is collected by the company, there is no "
+#~ "telling what it will be used for."
+#~ msgstr ""
+#~ "L'article donne des exemples particuliers : Microsoft OneDrive, Mint "
+#~ "(division d'Intuit), Nike, Spotify, le Washington Post, le Weather "
+#~ "Channel (propriété d'IBM), le service Citizen d'alerte sur les délits, "
+#~ "Yelp et DoorDash. Mais il est probable que la plupart des applis non "
+#~ "libres contiennent des pisteurs. Certains envoient des informations "
+#~ "permettant d'identifier la personne, comme l'empreinte du téléphone, sa "
+#~ "localisation exacte, l'adresse de courriel et le numéro de téléphone de 
"
+#~ "l'utilisateur, ou même une adresse de livraison (dans le cas de "
+#~ "DoorDash). Une fois que cette information a été collectée par la 
société, "
+#~ "les paris sont ouverts quant à son utilisation."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary.it-diff.html    15 Jul 2019 10:02:25 -0000      1.116
+++ proprietary.it-diff.html    16 Jul 2019 20:29:52 -0000      1.117
@@ -160,10 +160,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -185,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
@@ -241,23 +252,6 @@
     href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
     with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
-    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
-    fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -318,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:25 $
+$Date: 2019/07/16 20:29:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary.it.po   15 Jul 2019 10:02:25 -0000      1.155
+++ proprietary.it.po   16 Jul 2019 20:29:52 -0000      1.156
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -512,25 +526,6 @@
 "protect users' privacy."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.ja-diff.html    15 Jul 2019 10:02:25 -0000      1.119
+++ proprietary.ja-diff.html    16 Jul 2019 20:29:52 -0000      1.120
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -182,6 +182,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
@@ -238,23 +249,6 @@
     href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
     with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
-    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
-    fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -315,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:25 $
+$Date: 2019/07/16 20:29:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary.ja.po   15 Jul 2019 10:02:25 -0000      1.139
+++ proprietary.ja.po   16 Jul 2019 20:29:52 -0000      1.140
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -307,6 +307,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -376,25 +390,6 @@
 "protect users' privacy."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary.nl-diff.html    15 Jul 2019 10:02:26 -0000      1.116
+++ proprietary.nl-diff.html    16 Jul 2019 20:29:52 -0000      1.117
@@ -160,10 +160,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -185,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
@@ -241,23 +252,6 @@
     href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
     with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
-    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
-    fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -318,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:26 $
+$Date: 2019/07/16 20:29:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary.nl.po   15 Jul 2019 10:02:26 -0000      1.127
+++ proprietary.nl.po   16 Jul 2019 20:29:52 -0000      1.128
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -505,25 +519,6 @@
 "protect users' privacy."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary.pl-diff.html    15 Jul 2019 10:02:26 -0000      1.134
+++ proprietary.pl-diff.html    16 Jul 2019 20:29:52 -0000      1.135
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -127,17 +127,17 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -183,6 +183,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
@@ -239,23 +250,6 @@
     href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
     with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
-    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
-    fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -316,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:26 $
+$Date: 2019/07/16 20:29:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.pl.po   15 Jul 2019 10:02:26 -0000      1.122
+++ proprietary.pl.po   16 Jul 2019 20:29:52 -0000      1.123
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -588,25 +602,6 @@
 "protect users' privacy."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.pot     15 Jul 2019 10:02:26 -0000      1.119
+++ proprietary.pot     16 Jul 2019 20:29:52 -0000      1.120
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=CHARSET\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -249,6 +249,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a "
+"href=\"https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/\";> "
+"there is a back door in MacOS</a> for automatically updating some (all?) "
+"apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a "
 
"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\";>
 "
 "not to allow them access to locations</a>."
@@ -319,25 +334,6 @@
 "several changes to protect users' privacy."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a "
-"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\";>
 "
-"sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.pt-br.po        15 Jul 2019 10:02:26 -0000      1.182
+++ proprietary.pt-br.po        16 Jul 2019 20:29:52 -0000      1.183
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2019-07-01 02:08-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -297,6 +297,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -395,38 +409,6 @@
 "icecat/\">IceCat</a>, uma versão modificada do Firefox com várias 
alterações "
 "para proteger a privacidade dos usuários."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-"Apesar do suposto compromisso da Apple com a privacidade, os aplicativos "
-"para iPhone contêm rastreadores ocupados à noite <a 
href=\"https://freediggz.";
-"com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-"
-"iphone-is-talking-to/\"> enviando informações pessoais dos usuários para "
-"terceiros</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-"O artigo menciona exemplos específicos: Microsoft OneDrive, Intuit’s Mint, 
"
-"Nike, Spotify, The Washington Post, The Weather Channel (de propriedade da "
-"IBM), o serviço de alerta de crime Citizen, Yelp e DoorDash. Mas é 
provável "
-"que a maioria dos aplicativos não livres contenham rastreadores. Algumas "
-"delas enviam dados de identificação pessoal, como impressão digital do "
-"telefone, localização exata, endereço de e-mail, número de telefone ou 
até "
-"mesmo endereço de entrega (no caso da DoorDash). Uma vez que essa 
informação "
-"é coletada pela empresa, não há como dizer para que ela será usada."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -502,6 +484,39 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+#~ "trackers that are busy at night <a href=\"https://freediggz.";
+#~ "com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-"
+#~ "your-iphone-is-talking-to/\"> sending users' personal information to "
+#~ "third parties</a>."
+#~ msgstr ""
+#~ "Apesar do suposto compromisso da Apple com a privacidade, os aplicativos "
+#~ "para iPhone contêm rastreadores ocupados à noite <a href=\"https://";
+#~ "freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-"
+#~ "know-who-your-iphone-is-talking-to/\"> enviando informações pessoais dos 
"
+#~ "usuários para terceiros</a>."
+
+#~ msgid ""
+#~ "The article mentions specific examples: Microsoft OneDrive, Intuit’s "
+#~ "Mint, Nike, Spotify, The Washington Post, The Weather Channel (owned by "
+#~ "IBM), the crime-alert service Citizen, Yelp and DoorDash. But it is "
+#~ "likely that most nonfree apps contain trackers. Some of these send "
+#~ "personally identifying data such as phone fingerprint, exact location, "
+#~ "email address, phone number or even delivery address (in the case of "
+#~ "DoorDash). Once this information is collected by the company, there is no "
+#~ "telling what it will be used for."
+#~ msgstr ""
+#~ "O artigo menciona exemplos específicos: Microsoft OneDrive, Intuit’s "
+#~ "Mint, Nike, Spotify, The Washington Post, The Weather Channel (de "
+#~ "propriedade da IBM), o serviço de alerta de crime Citizen, Yelp e "
+#~ "DoorDash. Mas é provável que a maioria dos aplicativos não livres "
+#~ "contenham rastreadores. Algumas delas enviam dados de identificação "
+#~ "pessoal, como impressão digital do telefone, localização exata, 
endereço "
+#~ "de e-mail, número de telefone ou até mesmo endereço de entrega (no caso 
"
+#~ "da DoorDash). Uma vez que essa informação é coletada pela empresa, não 
há "
+#~ "como dizer para que ela será usada."
+
+#~ msgid ""
 #~ "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 #~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
 #~ "by-anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- proprietary.ru.po   15 Jul 2019 11:01:09 -0000      1.260
+++ proprietary.ru.po   16 Jul 2019 20:29:52 -0000      1.261
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -408,38 +423,6 @@
 "icecat/\">IceCat</a>, модифицированную версию Firefox 
с изменениями для "
 "защиты личной жизни пользователей."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-"Несмотря на то, что компания Apple якобы 
стоит на страже неприкосновенности "
-"личной жизни, в приложениях iPhone есть 
программы отслеживания, которые по "
-"ночам <a 
href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-";
-"of-the-night-do-you-know-who-your-iphone-is-talking-to/\"> отсылают 
личные "
-"данные пользователя третьим сторонам</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-"В статье приводятся конкретные примеры: 
Microsoft OneDrive, Mint компании "
-"Intuit, Nike, Spotify, Washington Post, Weather Channel 
(собственность IBM), "
-"служба оповедения о преступлениях Citizen, Yelp 
и DoorDash. Но вероятно, "
-"программы слежения есть в большинстве 
несвободных приложений. Некоторые из "
-"них отсылают идентифицирующие личность 
данные, такие как отпечаток телефона, "
-"точное местоположение, адрес электронной 
почты, номер телефона и даже адрес "
-"доставки (в случае DoorDash). После того как 
эта информация собрана "
-"компанией, невозможно сказать, для чего ее 
будут использовать."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -519,6 +502,39 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+#~ "trackers that are busy at night <a href=\"https://freediggz.";
+#~ "com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-"
+#~ "your-iphone-is-talking-to/\"> sending users' personal information to "
+#~ "third parties</a>."
+#~ msgstr ""
+#~ "Несмотря на то, что компания Apple якобы 
стоит на страже "
+#~ "неприкосновенности личной жизни, в 
приложениях iPhone есть программы "
+#~ "отслеживания, которые по ночам <a 
href=\"https://freediggz.com/2019/05/28/";
+#~ "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+#~ "talking-to/\"> отсылают личные данные 
пользователя третьим сторонам</a>."
+
+#~ msgid ""
+#~ "The article mentions specific examples: Microsoft OneDrive, Intuit’s "
+#~ "Mint, Nike, Spotify, The Washington Post, The Weather Channel (owned by "
+#~ "IBM), the crime-alert service Citizen, Yelp and DoorDash. But it is "
+#~ "likely that most nonfree apps contain trackers. Some of these send "
+#~ "personally identifying data such as phone fingerprint, exact location, "
+#~ "email address, phone number or even delivery address (in the case of "
+#~ "DoorDash). Once this information is collected by the company, there is no "
+#~ "telling what it will be used for."
+#~ msgstr ""
+#~ "В статье приводятся конкретные примеры: 
Microsoft OneDrive, Mint компании "
+#~ "Intuit, Nike, Spotify, Washington Post, Weather Channel 
(собственность "
+#~ "IBM), служба оповедения о преступлениях 
Citizen, Yelp и DoorDash. Но "
+#~ "вероятно, программы слежения есть в 
большинстве несвободных приложений. "
+#~ "Некоторые из них отсылают 
идентифицирующие личность данные, такие 
как "
+#~ "отпечаток телефона, точное 
местоположение, адрес электронной почты, 
номер "
+#~ "телефона и даже адрес доставки (в случае 
DoorDash). После того как эта "
+#~ "информация собрана компанией, 
невозможно сказать, для чего ее будут "
+#~ "использовать."
+
+#~ msgid ""
 #~ "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 #~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
 #~ "by-anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.zh-tw-diff.html 15 Jul 2019 10:02:26 -0000      1.94
+++ proprietary.zh-tw-diff.html 16 Jul 2019 20:29:52 -0000      1.95
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -126,12 +126,12 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -161,10 +161,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -186,6 +186,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
@@ -242,23 +253,6 @@
     href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
     with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
-    
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
-    fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -319,7 +313,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:26 $
+$Date: 2019/07/16 20:29:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.zh-tw.po        15 Jul 2019 10:02:26 -0000      1.105
+++ proprietary.zh-tw.po        16 Jul 2019 20:29:52 -0000      1.106
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -419,25 +433,6 @@
 "protect users' privacy."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/";
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuit’s Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- pt-br.po    15 Jul 2019 10:02:26 -0000      1.137
+++ pt-br.po    16 Jul 2019 20:29:52 -0000      1.138
@@ -640,6 +640,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- ru.po       15 Jul 2019 10:28:50 -0000      1.237
+++ ru.po       16 Jul 2019 20:29:52 -0000      1.238
@@ -718,6 +718,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "
@@ -4501,18 +4515,17 @@
 "to locations</a>."
 msgstr ""
 "Многие приложения Android могут отслеживать 
перемещения пользователей, даже "
-"когда пользователь <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> не позволяет 
им "
-"получать доступ к местоположению</a>."
+"когда пользователь <a 
href=\"https://www.theverge.com/2019/7/8/20686514/";
+"android-covert-channel-permissions-data-collection-imei-ssid-location\"> не 
"
+"позволяет им получать доступ к 
местоположению</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
 "This involves an apparently unintentional weakness in Android, exploited "
 "intentionally by malicious apps."
 msgstr ""
-"Это связано с очевидно непреднамеренной 
слабостью в Android, "
-"преднамеренно используемой вредоносными 
приложениями."
+"Это связано с очевидно непреднамеренной 
слабостью в Android, преднамеренно "
+"используемой вредоносными приложениями."
 
 #. type: Content of: <h3>
 msgid "Google Interference"

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- zh-tw.po    15 Jul 2019 10:02:26 -0000      1.107
+++ zh-tw.po    16 Jul 2019 20:29:52 -0000      1.108
@@ -591,6 +591,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious&mdash;it "
+"protected users from surveillance by third parties&mdash;but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Dropbox app for Macintosh <a href=\"http://applehelpwriter.";
 "com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
 "control of user interface items after luring the user into entering an admin "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]