www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sun, 21 Jul 2019 12:29:32 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/07/21 12:29:31

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.454&r2=1.455
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.313&r2=1.314
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.548&r2=1.549
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.112&r2=1.113

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- de.po       21 Jul 2019 05:59:02 -0000      1.113
+++ de.po       21 Jul 2019 16:29:30 -0000      1.114
@@ -5656,6 +5656,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- es.po       21 Jul 2019 05:59:02 -0000      1.153
+++ es.po       21 Jul 2019 16:29:30 -0000      1.154
@@ -4779,6 +4779,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- fr.po       21 Jul 2019 06:14:54 -0000      1.196
+++ fr.po       21 Jul 2019 16:29:30 -0000      1.197
@@ -4704,6 +4704,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- it.po       21 Jul 2019 05:59:02 -0000      1.113
+++ it.po       21 Jul 2019 16:29:30 -0000      1.114
@@ -5337,6 +5337,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- ja.po       21 Jul 2019 05:59:02 -0000      1.119
+++ ja.po       21 Jul 2019 16:29:30 -0000      1.120
@@ -4079,6 +4079,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-google.de-diff.html 15 Jul 2019 10:02:20 -0000      1.29
+++ malware-google.de-diff.html 21 Jul 2019 16:29:30 -0000      1.30
@@ -322,29 +322,64 @@
 
 &lt;h3 id="surveillance"&gt;Google Surveillance&lt;/h3&gt;
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
+      sometimes very clever. Some trackers can &lt;a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Android tracks location for Google</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201906220"&gt;
-    &lt;p&gt;Google Chrome is an &lt;a
-    
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google "Assistant" records users' conversations</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even</em></ins></span>
+    when <span class="removed"><del><strong>&ldquo;location services&rdquo; 
are turned off, even</strong></del></span> <span class="inserted"><ins><em>it 
is not supposed to listen&lt;/a&gt;. Thus,</em></ins></span> when <span 
class="removed"><del><strong>the phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google Chrome contains</strong></del></span> <span 
class="inserted"><ins><em>one of Google's
+    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>key logger</strong></del></span> <span 
class="inserted"><ins><em>thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google "Assistant" uses proprietary software, there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+       sends</strong></del></span> <span class="inserted"><ins><em>the user 
wants to send to some</em></ins></span> Google <span 
class="removed"><del><strong>every URL typed in&lt;/a&gt;, one key at a 
time.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201906220"&gt;
+    &lt;p&gt;Google</em></ins></span> Chrome <span 
class="removed"><del><strong>includes a module that</strong></del></span> <span 
class="inserted"><ins><em>is an</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+       activates microphones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
     instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
-    users' computers and report the sites they visit to advertising and
-    data companies, first of all to Google. Moreover, if users have a
-    Gmail account, Chrome automatically logs them</em></ins></span> in <span 
class="removed"><del><strong>popular Android apps</strong></del></span> <span 
class="inserted"><ins><em>to the browser for
+    users' computers</em></ins></span> and <span 
class="removed"><del><strong>transmits audio to its servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices 
when</strong></del></span> <span class="inserted"><ins><em>report the 
sites</em></ins></span> they <span class="removed"><del><strong>are sold.
+      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>visit</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal</strong></del></span> <span 
class="inserted"><ins><em>advertising and</em></ins></span>
+    data <span class="inserted"><ins><em>companies, first of 
all</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to the browser for
     more convenient profiling. On Android, Chrome also reports their
     location to Google.&lt;/p&gt;
 
-    &lt;p&gt;The best way to escape surveillance</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>to switch to &lt;a
+    &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
     href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
     with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones,</em></ins></span> 
and sometimes <span class="removed"><del><strong>very clever. Some trackers 
can</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Nonfree software in the phone has to be responsible for sending
@@ -357,7 +392,7 @@
     let Google monitor their phone use, and all internet use in their
     homes, for an extravagant payment of $20&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is not</em></ins></span> a <span 
class="removed"><del><strong>user's movements around</strong></del></span> 
<span class="inserted"><ins><em>malicious functionality of</em></ins></span> a 
<span class="removed"><del><strong>physical store</strong></del></span> <span 
class="inserted"><ins><em>program with some other
+    &lt;p&gt;This is not a malicious functionality of a program with some other
     purpose; this is the software's sole purpose, and Google says so. But
     Google says it in a way that encourages most people to ignore the
     details. That, we believe, makes it fitting to list here.&lt;/p&gt;
@@ -378,25 +413,19 @@
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked</em></ins></span> by <span 
class="removed"><del><strong>noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the misleading control.&lt;/p&gt;</em></ins></span>
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
-    &lt;p&gt;Android</em></ins></span> tracks location for Google &lt;a
+  &lt;li id="M201711210"&gt;
+    &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
     even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM <span 
class="removed"><del><strong>card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger 
that</strong></del></span> <span 
class="inserted"><ins><em>card&lt;/a&gt;.&lt;/p&gt;
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704131"&gt;
-    &lt;p&gt;Low-priced Chromebooks for schools are</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
-       sends</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
     collecting far more data on students than is necessary, and store
     it indefinitely&lt;/a&gt;. Parents and students complain about the lack
     of transparency on the part of both the educational services and the
@@ -404,21 +433,19 @@
     of proper privacy policies, among other things.&lt;/p&gt;
 
     &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
-    should realize that the software</em></ins></span> Google <span 
class="removed"><del><strong>every URL typed in&lt;/a&gt;, one 
key</strong></del></span> <span class="inserted"><ins><em>uses to spy on 
students is
+    should realize that the software Google uses to spy on students is
     nonfree, so they can't verify what it really does. The only remedy is
     to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
     exclusively use free software&lt;/a&gt; for both education and school
     administration. If the school is run locally, parents and teachers
-    can mandate their representatives</em></ins></span> at <span 
class="inserted"><ins><em>the School Board to refuse the
-    budget unless the school initiates</em></ins></span> a <span 
class="removed"><del><strong>time.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>switch to free software. If
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
     education is run nation-wide, they need to persuade legislators
     (e.g., through free software organizations, political parties,
-    etc.) to migrate the public schools to free 
software.&lt;/p&gt;</em></ins></span>
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+  &lt;li id="M201609210"&gt;
     &lt;p&gt;Google's new voice messaging app &lt;a
     
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
     all conversations&lt;/a&gt;.&lt;/p&gt;
@@ -443,19 +470,15 @@
   &lt;/li&gt;
 
   &lt;li id="M201506180"&gt;
-    &lt;p&gt;Google</em></ins></span> Chrome includes a module that &lt;a
+    &lt;p&gt;Google Chrome includes a module that &lt;a
     
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
     activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola phones modify Android to
-      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers</em></ins></span> send 
<span class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot 
of</em></ins></span>
-    data <span class="removed"><del><strong>to 
Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308040"&gt;
@@ -639,7 +662,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:20 $
+$Date: 2019/07/21 16:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-google.de.po        15 Jul 2019 10:02:20 -0000      1.44
+++ malware-google.de.po        21 Jul 2019 16:29:30 -0000      1.45
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -645,6 +645,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-google.es.po        18 Jul 2019 09:40:53 -0000      1.16
+++ malware-google.es.po        21 Jul 2019 16:29:30 -0000      1.17
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-17 11:45+0200\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2019-07-18 11:25+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -503,6 +504,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- malware-google.fr.po        15 Jul 2019 11:32:42 -0000      1.73
+++ malware-google.fr.po        21 Jul 2019 16:29:30 -0000      1.74
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2019-07-15 13:32+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -505,6 +506,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- malware-google.pot  15 Jul 2019 10:02:20 -0000      1.40
+++ malware-google.pot  21 Jul 2019 16:29:30 -0000      1.41
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -358,6 +358,28 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a "
+"href=\"https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/\";>even
 "
+"when it is not supposed to listen</a>. Thus, when one of Google's "
+"subcontractors discloses a thousand confidential voice recordings, users "
+"were easily identified from these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a "
 
"href=\"https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/\";>
 "
 "instrument of surveillance</a>. It lets thousands of trackers invade users' "

Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-google.ru.po        15 Jul 2019 11:01:09 -0000      1.93
+++ malware-google.ru.po        21 Jul 2019 16:29:30 -0000      1.94
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2018-10-05 09:03+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -502,6 +503,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- nl.po       21 Jul 2019 05:59:02 -0000      1.113
+++ nl.po       21 Jul 2019 16:29:30 -0000      1.114
@@ -3881,6 +3881,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- pl.po       21 Jul 2019 05:59:02 -0000      1.113
+++ pl.po       21 Jul 2019 16:29:30 -0000      1.114
@@ -3334,6 +3334,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- pot 21 Jul 2019 05:59:02 -0000      1.112
+++ pot 21 Jul 2019 16:29:30 -0000      1.113
@@ -3144,6 +3144,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary-surveillance.de-diff.html       15 Jul 2019 10:02:23 -0000      
1.85
+++ proprietary-surveillance.de-diff.html       21 Jul 2019 16:29:30 -0000      
1.86
@@ -923,117 +923,252 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;In</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones,</em></ins></span> 
and <span class="inserted"><ins><em>sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>EU 
Copyright Directive make</strong></del></span> <span 
class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>movements of Android 
phones,</em></ins></span> and <span class="removed"><del><strong>Bluetooth the
+      obvious way</strong></del></span> <span 
class="inserted"><ins><em>sometimes</em></ins></span> &lt;a
+ <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn them off&mdash;only until 5am.
+      That's Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you 
want</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to be <span 
class="removed"><del><strong>spied on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
-    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
iMessage</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
+    &lt;p&gt;Facebook's</em></ins></span> app <span 
class="removed"><del><strong>on iThings</strong></del></span> <span 
class="inserted"><ins><em>got &ldquo;consent&rdquo; to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
     what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
+    &lt;p&gt;An Android</em></ins></span> phone <span 
class="removed"><del><strong>number that</strong></del></span> <span 
class="inserted"><ins><em>was observed to track location even while
+    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>location 
data while in
     airplane mode.  Instead, &lt;a
-    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;</em></ins></span>
-    it <span class="inserted"><ins><em>saved up the data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
+    it saved up</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
+    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;</em></ins></span>
+    even <span class="removed"><del><strong>gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>when &ldquo;location services&rdquo; are turned 
off, even when</em></ins></span>
+    the <span class="removed"><del><strong>code Apple
+      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold</em></ins></span> with <span class="removed"><del><strong>third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>spyware sending lots of data</em></ins></span> to 
<span class="removed"><del><strong>Apple's servers all</strong></del></span> 
<span class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> the <span class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video</strong></del></span> 
<span class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if</em></ins></span> you <span 
class="removed"><del><strong>take,</strong></del></span> <span 
class="inserted"><ins><em>disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>keeps them up to date on all your devices.
+      Any edits</strong></del></span> <span class="inserted"><ins><em>location 
tracking,</em></ins></span> you <span class="removed"><del><strong>make are 
automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>must
+    disable Google Play itself to completely stop</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>tracking.  This</em></ins></span> is <span 
class="removed"><del><strong>a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span>
+    <span class="inserted"><ins><em>yet another example</em></ins></span> of 
<span class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to 
break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>nonfree 
software pretending</em></ins></span> to <span class="removed"><del><strong>get 
at them, but NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example of nonfree software pretending to obey the user,
-    when it's actually doing something else.  Such a thing</em></ins></span> 
would <span class="inserted"><ins><em>be almost
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>obey</em></ins></span> the <span 
class="inserted"><ins><em>user,
+    when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
-    transmission is a substantial expense for users.  Said transmission,
-    not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>get other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>they send so much data that their
+    transmission</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature</strong></del></span> <span 
class="inserted"><ins><em>substantial expense</em></ins></span> for <span 
class="removed"><del><strong>web sites to track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span> <span class="inserted"><ins><em>users.  
Said transmission,
+    not wanted or requested</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it
+      is still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201403120"&gt;
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> the 
<span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user, clearly must constitute spying
+    of some kind.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+    Samsung's back door&lt;/a&gt; provides access to any 
file</em></ins></span> on <span 
class="removed"><del><strong>all</strong></del></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports that &lt;a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
+    Journal (in</em></ins></span> an <span class="removed"><del><strong>iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem to exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span> <span class="inserted"><ins><em>article blocked from 
us by a paywall) reports that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone</em></ins></span> in 
<span class="removed"><del><strong>popular</strong></del></span> Android <span 
class="removed"><del><strong>apps is pervasive</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span>
+    and
+      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can</strong></del></span> <span class="inserted"><ins><em>laptops&lt;/a&gt;.  
(I suspect this means Windows laptops.)  Here is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices when they are
-    sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware is present in some Android devices</em></ins></span> when 
<span class="removed"><del><strong>&ldquo;location 
services&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>they</em></ins></span> are <span 
class="removed"><del><strong>turned off, even</strong></del></span>
+    <span class="inserted"><ins><em>sold.  Some Motorola phones, 
made</em></ins></span> when <span class="removed"><del><strong>the phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span> <span 
class="inserted"><ins><em>this company was owned
+    by Google, use a modified version</em></ins></span> of <span 
class="inserted"><ins><em>Android that &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+    sends personal</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone &lt;a
-    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to turn the phones
+      on and off, listen to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history, and read the contact list. This malware is designed to
+      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,
+      and they send so much data</strong></del></span> that <span 
class="removed"><del><strong>their transmission</strong></del></span> <span 
class="inserted"><ins><em>install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>a
+      substantial expense for users.  Said transmission,</strong></del></span> 
not <span class="removed"><del><strong>wanted or
+      requested by</strong></del></span> <span 
class="inserted"><ins><em>enough to
     legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+    reading</em></ins></span> the <span 
class="removed"><del><strong>user,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms and Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should</em></ins></span> 
clearly <span class="removed"><del><strong>must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>and
+    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, instead of
+    hiding it</em></ins></span> in <span class="removed"><del><strong>Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in</strong></del></span> an <span 
class="removed"><del><strong>article blocked</strong></del></span> <span 
class="inserted"><ins><em>obscurely worded EULA.&lt;/p&gt;
 
     &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information in the
+    and other companies</em></ins></span> from <span 
class="removed"><del><strong>us by</strong></del></span> <span 
class="inserted"><ins><em>getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="removed"><del><strong>paywall)
+      reports that</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
     hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1046,54 +1181,79 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books</em></ins></span> can <span 
class="removed"><del><strong>remotely activate the GPS and microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>contain 
JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops</em></ins></span> on
+      <span class="removed"><del><strong>remote command and users cannot stop 
them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries, &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is to restrict</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries, &lt;a
     
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    send lots</em></ins></span> of data <span 
class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
-&lt;div class="big-section"&gt;
+&lt;div <span class="inserted"><ins><em>class="big-section"&gt;
   &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
+&lt;div</em></ins></span> class="big-subsection"&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
     &lt;p&gt;Foundry's graphics software &lt;a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
     reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
+    often a legal threat demanding a lot of money.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>moviepass app and 
dis-service spy on users</strong></del></span> <span 
class="inserted"><ins><em>fact that this is used for repression of forbidden 
sharing
+    makes it</em></ins></span> even more <span 
class="removed"><del><strong>than users
+      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going to</strong></del></span> 
<span class="inserted"><ins><em>vicious.&lt;/p&gt;
 
     &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+    is not</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cure for 
the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered 
driving</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1102,111 +1262,242 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Many Android</em></ins></span> apps can
+    <span class="removed"><del><strong>&lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;</strong></del></span>
 track <span class="removed"><del><strong>your every move&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span>
+    <span class="inserted"><ins><em>users' movements even when the user 
says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note that this article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>allow 
them access</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
+    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Facebook's</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>listens all the time,</strong></del></span> <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
+    be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in</strong></del></span> <span 
class="inserted"><ins><em>run a</em></ins></span> proprietary <span 
class="removed"><del><strong>search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
+    the <span class="inserted"><ins><em>event.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
+    &lt;p&gt;This</em></ins></span> app is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>a spyware that can snoop</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>a lot of
+    sensitive data, including user's location</em></ins></span> and <span 
class="inserted"><ins><em>contact list, and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A</strong></del></span>
 
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and</em></ins></span> pregnancy <span 
class="removed"><del><strong>test controller application not only
+  can</strong></del></span> <span class="inserted"><ins><em>monitoring apps is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span>
+    <span class="inserted"><ins><em>data is 
&ldquo;anonymized</em></ins></span> and <span class="removed"><del><strong>in 
server accounts,</strong></del></span> <span 
class="inserted"><ins><em>aggregated,&rdquo;</em></ins></span> it can
+  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span> <span 
class="inserted"><ins><em>easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>woman who 
uses</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>surveillance is inadequate 
as</strong></del></span> <span class="inserted"><ins><em>women's rights to 
equal employment
     and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
-    spying on you is available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span> <span 
class="inserted"><ins><em>reward to do so. A
+    free-software</em></ins></span> app <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> that <span 
class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span> <span 
class="inserted"><ins><em>does more or less the same thing without
+    spying</em></ins></span> on <span class="removed"><del><strong>what radio 
and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>you is available from &lt;a
+    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    a</em></ins></span> new <span class="removed"><del><strong>Magic Photo 
app</strong></del></span> <span class="inserted"><ins><em>one is being 
developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share the picture you take 
according</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>who
+      is in</strong></del></span> <span class="inserted"><ins><em>sensitive 
data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>data, or pass it on</em></ins></span> to <span 
class="removed"><del><strong>require online</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have</em></ins></span> 
access to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span>
+    the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>network but no 
direct access</em></ins></span> to <span class="removed"><del><strong>be
+      sent across</strong></del></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
+    surveillance on which</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>has 
absolutely no control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>realize that</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it is <span class="removed"><del><strong>nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>buried in
+    lengthy terms of service</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a 
way</strong></del></span> <span class="inserted"><ins><em>are 
difficult</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>a typical example of
+      the attitude of the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>apps</strong></del></span>
+    <span class="inserted"><ins><em>library</em></ins></span> for <span 
class="inserted"><ins><em>building</em></ins></span> mobile <span 
class="removed"><del><strong>devices report</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> which <span 
class="removed"><del><strong>other
+    apps the user has
+    installed.</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
+    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android</em></ins></span> apps <span class="removed"><del><strong>snoop on the 
user&lt;/a&gt;. This is in addition to
+      the snooping done by the phone company,</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by the question</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. 
As</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>app 
developers get
+      users</strong></del></span> <span class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>other companies, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
+    that</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
 
-  &lt;li id="M201902060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
@@ -1216,7 +1507,7 @@
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
-    the user interface of most of them was designed to make uninstallation
+    the user interface of most of them</em></ins></span> was <span 
class="removed"><del><strong>found</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to make <span 
class="inserted"><ins><em>uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
@@ -1227,8 +1518,8 @@
 
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
@@ -1268,7 +1559,7 @@
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook can correlate the data it obtains from the same machine via
-    various apps. Some of them send Facebook detailed information about
+    various apps. Some</em></ins></span> of <span 
class="inserted"><ins><em>them send Facebook detailed information about
     the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
@@ -1530,52 +1821,32 @@
     and suggests you to share the picture you take according to who is
     in the frame.&lt;/p&gt;
 
-    &lt;p&gt;This spyware feature seems to</em></ins></span> require <span 
class="removed"><del><strong>circumventing</strong></del></span> <span 
class="inserted"><ins><em>online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely to be
-    sent across</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>wire to Facebook's 
servers</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which means the pictures are likely to be
+    sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if</em></ins></span> the
-      <span class="removed"><del><strong>obvious way &lt;a
- 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn</strong></del></span> <span 
class="inserted"><ins><em>user didn't &ldquo;upload&rdquo;</em></ins></span> 
them <span class="removed"><del><strong>off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
to <span class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
service.&lt;/p&gt;</em></ins></span>
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>or watching&lt;/a&gt;. In addition,</em></ins></span>
-    it <span class="removed"><del><strong>without having your fingerprints
-      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's 
conversations</em></ins></span> to <span class="removed"><del><strong>tell 
whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
+  &lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
+    it may be analyzing people's conversations to serve them with targeted
     advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> data <span 
class="removed"><del><strong>to Apple's servers&lt;/a&gt;.  Big 
Brother</strong></del></span> <span class="inserted"><ins><em>in the phone, and 
in server accounts,
-    it</em></ins></span> can
-        <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>alter</em></ins></span> them <span 
class="removed"><del><strong>from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that <span 
class="inserted"><ins><em>include &lt;a
+  &lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps that include &lt;a
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
@@ -1584,53 +1855,37 @@
 
   &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to</em></ins></span> the <span class="removed"><del><strong>user 
types into it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
+    unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span class="removed"><del><strong>server 
records</strong></del></span> <span class="inserted"><ins><em>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article should not have described</em></ins></span> these 
<span class="removed"><del><strong>numbers for at least 30
-        days.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
-    to <span class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>say &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
+    &lt;p&gt;The article should not have described these apps as
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
-    legitimate, but is that valid? Software developers have no 
right</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article takes for granted that the usual analytics tools are
+    legitimate, but is that valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and</em></ins></span> 47% of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, from Android 
and</em></ins></span> iOS <span 
class="removed"><del><strong>apps</strong></del></span>
-    <span class="inserted"><ins><em>respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        
href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span> 
<span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share</em></ins></span>
+  &lt;li id="M201510300"&gt;
+    &lt;p&gt;More than 73% and 47% of mobile applications, from Android and iOS
+    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
     personal, behavioral and location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+  &lt;li id="M201508210"&gt;
     &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
     based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all the 
photos</strong></del></span> <span class="inserted"><ins><em>increased 
snooping&lt;/a&gt;,</em></ins></span> and
-      <span class="removed"><del><strong>videos</strong></del></span> <span 
class="inserted"><ins><em>some are starting
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
     to realize that it is nasty.&lt;/p&gt;
 
     &lt;p&gt;This article shows the &lt;a
     
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that</em></ins></span> they <span 
class="removed"><del><strong>make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps</strong></del></span> <span class="inserted"><ins><em>present 
snooping as a way to &ldquo;serve&rdquo;
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
     typical example of the attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
@@ -1646,7 +1901,7 @@
     proprietary apps, it was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of</em></ins></span> them <span 
class="removed"><del><strong>up</strong></del></span> <span 
class="inserted"><ins><em>are not in fact &lt;a
+    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
     is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
@@ -1654,29 +1909,19 @@
 
   &lt;li id="M201505060"&gt;
     &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span 
class="removed"><del><strong>date</strong></del></span> <span 
class="inserted"><ins><em>100 &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs,</em></ins></span> on <span 
class="removed"><del><strong>all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>the 
average.&lt;/p&gt;
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
-    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-      information&lt;/a&gt; as accessed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop</em></ins></span> on <span 
class="removed"><del><strong>24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>the 
user&lt;/a&gt;. This</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>in addition to
-    the snooping done</em></ins></span> by the
-      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>phone company, and perhaps by the OS in
+    &lt;p&gt;Widely used &lt;a
+    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
     the phone.&lt;/p&gt;
 
-    &lt;p&gt;Don't be distracted by the question</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>whether the app developers
+    &lt;p&gt;Don't be distracted by the question of whether the app developers
     get users to say &ldquo;I agree&rdquo;. That is no excuse for
     malware.&lt;/p&gt;
   &lt;/li&gt;
@@ -1684,113 +1929,57 @@
   &lt;li id="M201411260"&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
     report which other apps the user has installed.  &lt;a
-    
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</em></ins></span>
-    is <span class="inserted"><ins><em>doing this in</em></ins></span> a way 
<span class="removed"><del><strong>to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts</strong></del></span> <span class="inserted"><ins><em>that at least is 
visible and optional&lt;/a&gt;. Not
-    as bad</em></ins></span> as <span class="inserted"><ins><em>what the 
others do.&lt;/p&gt;
+    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
+    as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
-    &lt;p&gt;The Simeji keyboard is</em></ins></span> a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this to
-      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA can access any</strong></del></span> 
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span 
class="removed"><del><strong>them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the</strong></del></span> <span 
class="inserted"><ins><em>Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
-      and get other info too.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
-    title="Input Method 
Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312270"&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose</em></ins></span> is 
<span class="removed"><del><strong>also a feature for web 
sites</strong></del></span> to <span class="removed"><del><strong>track users, 
which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 
6,</strong></del></span> <span class="inserted"><ins><em>restrict the
-    use of data on the user's computer,</em></ins></span> but it
-      <span class="removed"><del><strong>is still true in iOS 7.)&lt;/p&gt;
+    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
+    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> <span 
class="inserted"><ins><em>does surveillance too:</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+  &lt;li id="M201312270"&gt;
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
+    use of data on the user's computer, but it does surveillance too: &lt;a
+    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
     it tries to get the user's list of other people's phone
-    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation,</em></ins></span> for <span 
class="inserted"><ins><em>use by companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The FTC criticized this app because it asked</em></ins></span> 
the <span class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop on all the</strong></del></span> <span 
class="inserted"><ins><em>user to
-    approve sending personal</em></ins></span> data <span 
class="removed"><del><strong>in an iThing,
-      or</strong></del></span> <span class="inserted"><ins><em>to the app 
developer but did not ask
-    about sending</em></ins></span> it <span class="removed"><del><strong>is 
totally incompetent.&lt;/a&gt;&lt;/p&gt;
+    numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> to 
<span class="removed"><del><strong>exist for no
-      possible purpose</strong></del></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>companies.  This shows 
the weakness of</em></ins></span>
-    the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
+  &lt;li id="M201312060"&gt;
+    &lt;p&gt;The Brightest Flashlight app &lt;a
+    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The FTC criticized this app because it asked the user to
+    approve sending personal data to the app developer but did not ask
+    about sending it to other companies.  This shows the weakness of
+    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
+    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
-      sometimes very clever. Some trackers can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Android tracks location for Google</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
-    Microsoft changed Skype</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+    &lt;p&gt;Skype contains &lt;a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+    Microsoft changed Skype &lt;a
+    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1803,110 +1992,76 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201806240"&gt;
-    &lt;p&gt;Red Shell is a</em></ins></span> spyware <span 
class="removed"><del><strong>sending lots of</strong></del></span> <span 
class="inserted"><ins><em>that
+    &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers and sends it to third parties&lt;/a&gt;.&lt;/p&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>the massive
+    program along with an update to the massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span class="inserted"><ins><em>snoop on all 
open processes running on its user's computer&lt;/a&gt;.&lt;/p&gt;
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information</em></ins></span> to <span class="removed"><del><strong>turn 
the phones</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop</em></ins></span> on <span 
class="inserted"><ins><em>their users</em></ins></span> and <span 
class="removed"><del><strong>off, listen</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> to the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and web
-      browsing history, and read the contact list. This 
malware</strong></del></span>
-    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
-
-    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>designed to
-      disguise itself from investigation.&lt;/p&gt;
-  &lt;/li&gt;
+    video game consoles snoop on their users and report to the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a 
computer</em></ins></span> with
-    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
+    &lt;p&gt;A game console is a computer, and you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,</strong></del></span> and 
<span class="inserted"><ins><em>their users'
+    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>send so much data</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks</em></ins></span> that 
<span class="removed"><del><strong>their transmission is a
-      substantial expense for users.  Said transmission, not wanted or
-      requested by</strong></del></span> <span 
class="inserted"><ins><em>merge</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>data
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend a lot</em></ins></span> of 
<span class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens</strong></del></span> <span class="inserted"><ins><em>money. 
They also
-    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>voice all</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
-
-    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an</strong></del></span> article <span 
class="removed"><del><strong>blocked from us by a paywall)
-      reports</strong></del></span> <span class="inserted"><ins><em>describes 
gratis games, games</em></ins></span> that
-      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI</strong></del></span> <span class="inserted"><ins><em>cost 
money</em></ins></span>
-    can <span class="removed"><del><strong>remotely 
activate</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="removed"><del><strong>GPS and microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>same 
tactics.&lt;/p&gt;
+    &lt;p&gt;While the article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
     &lt;p&gt;Angry Birds &lt;a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    spies for companies, and the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
+  &lt;li id="M200510200"&gt;
     &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies</em></ins></span> on
-      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>every process running on a gamer's 
computer</em></ins></span> and <span class="removed"><del><strong>users cannot 
stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to</strong></del></span> <span class="inserted"><ins><em>sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities 
which</em></ins></span>
-    have <span 
class="removed"><del><strong>GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nothing to do with 
cheating.&lt;/p&gt;</em></ins></span>
+    spies on every process running on a gamer's computer and sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities which
+    have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -1919,97 +2074,48 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="inserted"><ins><em>people that</em></ins></span> use <span 
class="removed"><del><strong>of data on</strong></del></span> <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article uses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It is unfortunate that the article uses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see 
you</em></ins></span> on <span class="removed"><del><strong>users even more 
than users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that 
was</em></ins></span>
-before <span class="removed"><del><strong>and after going to a movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
-    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span> <span 
class="inserted"><ins><em>Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email 
addresses&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>user's address
-      book to developer's server.  Note that this article 
misuses</strong></del></span> the <span 
class="inserted"><ins><em>own</em></ins></span> words
-      <span class="removed"><del><strong>&ldquo;&lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>of</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on what people are listening</strong></del></span> <span 
class="inserted"><ins><em>company's
-    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In addition, it may
-    be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
+    CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
-    advertisements.&lt;/p&gt;
-       &lt;/li&gt;
-
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>make this spying acceptable, 
according</em></ins></span> to <span class="removed"><del><strong>do lots of 
surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access</strong></del></span> <span 
class="inserted"><ins><em>him,
-    is that</em></ins></span> it <span class="removed"><del><strong>demands to 
personal data</strong></del></span> <span class="inserted"><ins><em>is 
opt-in</em></ins></span> in <span class="inserted"><ins><em>newer models. But 
since</em></ins></span> the <span class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
+    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
+    is that it is opt-in in newer models. But since the Vizio software is
     nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
-        pre-install on some of its phones. The app</strong></del></span> <span 
class="inserted"><ins><em>all future updates</em></ins></span> will <span 
class="removed"><del><strong>give Verizon the same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>leave</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
+    and there is no guarantee that all future updates will leave the
+    settings unchanged.&lt;/p&gt;
 
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, 
for</em></ins></span> that <span class="removed"><del><strong>Google normally 
gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span>
-    <span class="inserted"><ins><em>matter),</em></ins></span> the <span 
class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>easiest way to make sure it isn't 
spying</em></ins></span> on <span class="removed"><del><strong>only one 
phone&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>you is
+    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
+    matter), the easiest way to make sure it isn't spying on you is
     to disconnect it from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
     if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software),</em></ins></span> 
and <span class="inserted"><ins><em>set up a
+    be an old computer running completely free software), and set up a
     firewall to block connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
@@ -2019,350 +2125,210 @@
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>article 
for</em></ins></span> the <span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>facts it 
presents. It
-    is too bad that</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>article finishes by advocating the
-    moral weakness</em></ins></span> of <span 
class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing</strong></del></span> <span 
class="inserted"><ins><em>surrendering to Netflix. The 
Netflix</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    &lt;p&gt;We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed</em></ins></span> on <span 
class="removed"><del><strong>many sorts of data in the 
phone,</strong></del></span> <span 
class="inserted"><ins><em>them,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span> <span 
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span>
-    <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>image is 
coming from</em></ins></span> the user's <span 
class="removed"><del><strong>consent&rdquo;
-        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>own computer,
-    the TV reports what it is. The existence of</em></ins></span> a <span 
class="removed"><del><strong>protection against massive</strong></del></span> 
<span class="inserted"><ins><em>way to disable the
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
     surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the</em></ins></span> surveillance.&lt;/p&gt;
+    does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
-    sounds to be picked up by proprietary malware running</em></ins></span>
-    on <span class="removed"><del><strong>various sites 
-      such</strong></del></span> <span class="inserted"><ins><em>other devices 
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that 
they
+  &lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to be picked up by proprietary malware running
+    on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
+    your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
+  &lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
-    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who</strong></del></span>
-    <span class="inserted"><ins><em>across devices.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
+    manufacturers in spying on their users: their &lt;a
+    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers can track you
+    across devices.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    &lt;p&gt;It is possible to turn this off, but having it enabled by default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
-    to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures</strong></del></span> 
<span class="inserted"><ins><em>company
-    already monitors. Tivo customers</em></ins></span> are <span 
class="removed"><del><strong>private
-      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>unaware 
they're
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to</em></ins></span> the <span class="removed"><del><strong>conversation 
between two users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>600 millions social media profiles the company
+    already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing 
all</em></ins></span>
-    users <span class="removed"><del><strong>submit</strong></del></span> to 
<span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>new 
combined surveillance by default.&lt;/p&gt;
+    information with online social media participation, Tivo can now &lt;a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance by default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people</em></ins></span> are <span 
class="removed"><del><strong>starting to realize that</strong></del></span> 
<span class="inserted"><ins><em>watching&lt;/a&gt;, even if</em></ins></span> 
it <span class="removed"><del><strong>is nasty.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The</strong></del></span>
 
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>isn't</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>toys My Friend Cayla</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize</em></ins></span> and <span 
class="removed"><del><strong>i-Que transmit</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
+      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps the user has
-    installed.</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span> 
what <span class="removed"><del><strong>the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they wanted 
to
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops</em></ins></span> on <span class="removed"><del><strong>a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>what programs 
people watch,</em></ins></span> and even <span 
class="removed"><del><strong>speak
+      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what they wanted to
     record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
-    used <span class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps</strong></del></span> <span 
class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to make its 
TVs</em></ins></span> snoop on <span class="removed"><del><strong>the 
user&lt;/a&gt;. This is in addition to
-      the snooping done by the phone company, and perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get</strong></del></span> <span 
class="inserted"><ins><em>what</em></ins></span>
-    users <span class="removed"><del><strong>to say &ldquo;I agree&rdquo;. 
That is no excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make</em></ins></span> its <span 
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
+    users <span class="removed"><del><strong>through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized this app 
because it asked</strong></del></span> <span class="inserted"><ins><em>Samsung 
&ldquo;Smart&rdquo; TV &lt;a
+  &lt;li id="M201502090"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung 
&ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>internet</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>give</em></ins></span> it to <span 
class="removed"><del><strong>other companies.  This shows the
-      weakness of</strong></del></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A</strong></del></span> <span 
class="inserted"><ins><em>be trusted unless it is done by</em></ins></span> free
-    software <span class="removed"><del><strong>flashlight
-      app would not.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Speech recognition is not to be trusted unless</em></ins></span> 
it <span class="removed"><del><strong>was surrounded</strong></del></span> 
<span class="inserted"><ins><em>is done</em></ins></span> by <span 
class="removed"><del><strong>a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based</strong></del></span> in <span 
class="removed"><del><strong>the U.S.&lt;/p&gt;
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than</strong></del></span> free
+    software <span class="removed"><del><strong>which users could have
+      checked and changed.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>your own computer.&lt;/p&gt;
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>in your own computer.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>listen in 
on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
-    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    data containing sensitive information will be transmitted to third
+    parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;</em></ins></span>
-    snooping <span class="removed"><del><strong>on its users 
through</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report</em></ins></span> was <span 
class="removed"><del><strong>sued for collecting lots</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>app</strong></del></span> 
<span class="inserted"><ins><em>report</em></ins></span> was <span 
class="removed"><del><strong>reporting the temperature</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't 
expect this has got
+    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data are totally inadequate.
-    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the 
<span class="removed"><del><strong>vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products to get users' formal
+    consent before collecting personal</em></ins></span> data <span 
class="removed"><del><strong>may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>are totally inadequate.
+    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>a
+      data broker,</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>data broker</strong></del></span> <span 
class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>make statements about
-      their products, rather than free software which users could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span> 
the <span class="removed"><del><strong>vibrator</strong></del></span>
-    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>have been able</strong></del></span> <span 
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to 
<span class="removed"><del><strong>figure out
+      who</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the
+    user <span class="removed"><del><strong>was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
     
-    &lt;p&gt;The company's statement</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
-    no effect&lt;/a&gt;.  (The fact</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span 
class="inserted"><ins><em>transmission reports a 404 error
-    really means nothing; the server could save that</em></ins></span> data 
<span class="removed"><del><strong>may be
-      true, but</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected by</strong></del></span> <span class="inserted"><ins><em>user 
watches, and</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>switch 
to turn this off has
+    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
+    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>server</em></ins></span> could <span 
class="removed"><del><strong>listen to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it had <span 
class="removed"><del><strong>sold the data to</strong></del></span> <span 
class="inserted"><ins><em>installed</em></ins></span> a
-      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span 
class="inserted"><ins><em>patch</em></ins></span> to <span 
class="removed"><del><strong>figure out
-      who the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
-    product could spy</em></ins></span> this <span 
class="removed"><del><strong>lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
-
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>save that data anyway.)&lt;/p&gt; 
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
-    &lt;p id="break-security-smarttv"&gt;&lt;a
-    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers</em></ins></span> found a way to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
+    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="inserted"><ins><em>stop this, but any
+    product could</em></ins></span> spy <span class="removed"><del><strong>on 
children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>this way.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span> <span class="inserted"><ins><em>break 
security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
-    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
+  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
+    &lt;p id="break-security-smarttv"&gt;&lt;a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span <span class="removed"><del><strong>class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>&ldquo;Smart&rdquo; Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture</em></ins></span> to <span 
class="removed"><del><strong>report its location</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
-    long-term.&lt;/p&gt;
-
-    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by, the user's front door.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on how Ring used</em></ins></span> to <span 
class="removed"><del><strong>someone else and</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look
-    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="removed"><del><strong>transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
-    name!&lt;/p&gt;
-
-    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site</strong></del></span> <span 
class="inserted"><ins><em>look at what's</em></ins></span> in <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;An LG</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>watch is designed
+      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location to someone else</strong></del></span> <span 
class="inserted"><ins><em>TV&lt;/a&gt;</em></ins></span>
+    and <span class="inserted"><ins><em>use its camera</em></ins></span> to 
<span class="removed"><del><strong>transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201511250"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>article says 
this</strong></del></span> <span class="inserted"><ins><em>Nest Cam 
&ldquo;smart&rdquo; camera</em></ins></span> is <span 
class="removed"><del><strong>a back door, but that could be a
-      misunderstanding.  However,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches</em></ins></span> it <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</em></ins></span> is <span class="removed"><del><strong>certainly 
surveillance, at
-      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>using it
-    to outsmart you.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
+      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but that could be a
+      misunderstanding.  However, it is certainly surveillance, at
+      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2377,109 +2343,127 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;&lt;p&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product 
as shipped doesn't act as</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+Note</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>place new items 
on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look</em></ins></span>
+    at <span class="removed"><del><strong>Work&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>the code 
could surely convert it
-    into one.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator &lt;a
-    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>everything</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span>
+    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be a better
+    name!&lt;/p&gt;
 
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>was surrounded by a person's
-    body), as well as the vibration frequency.&lt;/p&gt;
+    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
-    products, rather than free software which users could have checked
-    and changed.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
+    manufacturers promise not to look at what's</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>the videos. That's not
+    security for your home. Security means making sure they don't get to
+    see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>personal information about how people
-    used it&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201511250"&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
+      Microsoft changed Skype</strong></del></span>
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert it
+    into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
 &lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of 
C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
+
+  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -2491,112 +2475,150 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, 
if</strong></del></span> its <span class="removed"><del><strong>manufacturer 
can communicate</strong></del></span>
-    <span class="inserted"><ins><em>customers.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, 
if</strong></del></span> its <span class="removed"><del><strong>manufacturer 
can communicate with it,
+      is</strong></del></span> <span class="inserted"><ins><em>users through 
the proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>it,
-      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by</em></ins></span> a 
<span class="removed"><del><strong>surveillance device. &lt;a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>person's
+    body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span class="removed"><del><strong>fact
-      that</strong></del></span> <span class="inserted"><ins><em>manufacturer 
and</em></ins></span> the <span class="removed"><del><strong>device is 
tethered</strong></del></span> <span class="inserted"><ins><em>FBI could listen 
to these
-    conversations was unacceptable by itself.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;</em></ins></span>
 
-  &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;,</em></ins></span> a <span 
class="removed"><del><strong>server.&lt;/p&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>article describes 
wrongdoing by the manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>company that made</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for collecting lots of personal information about how people
+    used it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The company's statement</em></ins></span> that <span 
class="inserted"><ins><em>it was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>device is tethered</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to a <span class="removed"><del><strong>server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it</strong></del></span> <span 
class="inserted"><ins><em>speech recognition
-    company based in the U.S.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>data
+    broker,</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>data broker would 
have been able to figure out who the
+    user was.&lt;/p&gt;
 
-    &lt;p&gt;Those toys</em></ins></span> also <span 
class="removed"><del><strong>demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak 
into</em></ins></span> the <span class="removed"><del><strong>company
-      surveillance capability.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the company
+      <span class="removed"><del><strong>surveillance 
capability.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>has 
been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a
       <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</strong></del></span>
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</em></ins></span> the manufacturer <span 
class="removed"><del><strong>is using it</strong></del></span> <span 
class="inserted"><ins><em>and the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy 
on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    going</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span 
class="removed"><del><strong>e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;</strong></del></span>
+    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+&lt;ul class="blurbs"&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
   effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201907210"&gt;
+    &lt;p&gt;Google "Assistant" records users' conversations</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
-    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
-    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+    &lt;p&gt;That's easy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no 
authentication</strong></del></span> <span 
class="inserted"><ins><em>listen&lt;/a&gt;. Thus,</em></ins></span> when
+    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google "Assistant" uses proprietary software, there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
     even if <span class="removed"><del><strong>it asked for
     authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
@@ -3510,7 +3532,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:23 $
+$Date: 2019/07/21 16:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary-surveillance.de.po      15 Jul 2019 10:02:24 -0000      1.300
+++ proprietary-surveillance.de.po      21 Jul 2019 16:29:30 -0000      1.301
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -4101,6 +4101,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Alexa collects a lot more information from users than is necessary "
 "for correct functioning (time, location, recordings made without a "
 "legitimate prompt), and sends it to Amazon's servers, which store it "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.454
retrieving revision 1.455
diff -u -b -r1.454 -r1.455
--- proprietary-surveillance.fr.po      15 Jul 2019 11:32:42 -0000      1.454
+++ proprietary-surveillance.fr.po      21 Jul 2019 16:29:30 -0000      1.455
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2019-07-15 13:32+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3490,6 +3491,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Alexa collects a lot more information from users than is necessary "
 "for correct functioning (time, location, recordings made without a "
 "legitimate prompt), and sends it to Amazon's servers, which store it "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary-surveillance.it-diff.html       15 Jul 2019 10:02:25 -0000      
1.152
+++ proprietary-surveillance.it-diff.html       21 Jul 2019 16:29:30 -0000      
1.153
@@ -1464,7 +1464,9 @@
 
       &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>Parliament
-  this way, because they pass</strong></del></span>
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span>
     <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
@@ -2183,14 +2185,11 @@
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>had installed a patch to stop this, but any
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2198,25 +2197,20 @@
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
     Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
     send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
@@ -2230,38 +2224,16 @@
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
     give the manufacturer an unencrypted copy of everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
     manufacturers promise not to look at what's in the videos. That's not
-    security</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>your home. Security means making</em></ins></span> 
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+    security for your home. Security means making sure they don't get to
+    see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
@@ -2270,67 +2242,28 @@
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511250"&gt;</em></ins></span>
+  &lt;li id="M201511250"&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches <span 
class="removed"><del><strong>it &ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>it 
&ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
-    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>outsmart 
you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote</em></ins></span> changes <span 
class="removed"><del><strong>in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed</strong></del></span> <span class="inserted"><ins><em>code could 
surely convert it
+    listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2343,177 +2276,276 @@
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The</strong></del></span> <span class="inserted"><ins><em>was 
surrounded by a person's
+    minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free</em></ins></span> software <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>which users could have checked
+    products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company that made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
-    modem enables</strong></del></span>
-    <span class="inserted"><ins><em>user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>phone</strong></del></span> company 
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
-    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>physically remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> the <span 
class="removed"><del><strong>company to extract data remotely and
-      determine</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
-    conversations was unacceptable by itself.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>store it.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
-    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about</strong></del></span> <span class="inserted"><ins><em>a 
child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span> 
<span class="inserted"><ins><em>the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</em></ins></span> the manufacturer <span 
class="removed"><del><strong>is using it</strong></del></span> <span 
class="inserted"><ins><em>and the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and</em></ins></span> even 
<span class="removed"><del><strong>which page</strong></del></span> <span 
class="inserted"><ins><em>speak into</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span class="inserted"><ins><em>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips 
made</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>joke: The</strong></del></span> <span 
class="inserted"><ins><em>DJI drone
-    to snoop on</em></ins></span> other <span 
class="removed"><del><strong>day</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is in many cases &lt;a
+    &lt;p&gt;While you're using a DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>snoop on 
other people, DJI is in many cases &lt;a
     
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
-    it</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201907210"&gt;
+    &lt;p&gt;Google "Assistant" records users' conversations</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because the system has no 
authentication</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even</em></ins></span>
+    when
+    <span class="removed"><del><strong>accessed through the modem.  However, 
even if</strong></del></span> it <span class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software in the car</strong></del></span> is
+    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith</strong></del></span> <span 
class="inserted"><ins><em>not supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google "Assistant" uses proprietary software, there 
is</em></ins></span> no <span class="removed"><del><strong>one 
connects</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> to <span 
class="inserted"><ins><em>see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
+    get commands that</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send to some Google 
service.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
 <span class="inserted"><ins><em>id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more</em></ins></span> information 
<span class="removed"><del><strong>about drivers' movements&lt;/a&gt;,
+      which</strong></del></span> <span class="inserted"><ins><em>from users
+    than</em></ins></span> is <span class="inserted"><ins><em>necessary for 
correct functioning (time, location,
+    recordings</em></ins></span> made <span 
class="removed"><del><strong>available to car manufacturers, insurance 
companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span 
class="inserted"><ins><em>without</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>sends
+    it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
     even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
-    advertising companies</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see 
you</strong></del></span> <span class="inserted"><ins><em>government agencies. 
In other words,
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>invasion isn't 
done</strong></del></span> <span class="inserted"><ins><em>data remain on other 
servers&lt;/a&gt;, where they can be accessed</em></ins></span> by <span 
class="removed"><del><strong>malware. The</strong></del></span>
+    <span class="inserted"><ins><em>advertising companies and government 
agencies. In</em></ins></span> other
+      <span class="removed"><del><strong>cases mentioned are 
done</strong></del></span> <span class="inserted"><ins><em>words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
-before</strong></del></span> <span class="inserted"><ins><em>servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result,</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+    &lt;p&gt;Data collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> <span 
class="inserted"><ins><em>devices such as</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>Nest thermostat,</em></ins></span> the <span 
class="removed"><del><strong>company to extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>Philips
+    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>Chamberlain MyQ garage opener</em></ins></span> and 
<span class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span>
+    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
+    at home, not only in</em></ins></span> the <span 
class="removed"><del><strong>data
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>past (and, 
who knows,
+    in the future too?)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</strong></del></span>
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span> <span class="inserted"><ins><em>the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
     recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>data about</strong></del></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span> 
to <span class="removed"><del><strong>spy on their renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+    location and</em></ins></span> other <span 
class="removed"><del><strong>day a woman came up to me</strong></del></span> 
<span class="inserted"><ins><em>personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &lt;p&gt;Since the client program is nonfree,</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I 
see</strong></del></span> <span class="inserted"><ins><em>data processing is 
done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    tell</em></ins></span> you <span class="removed"><del><strong>on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>how and where it's done&rdquo;), users have no way
+    to know what happens to</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human 
eavesdroppers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
     break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3271,7 +3303,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:25 $
+$Date: 2019/07/21 16:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.313
retrieving revision 1.314
diff -u -b -r1.313 -r1.314
--- proprietary-surveillance.it.po      15 Jul 2019 10:02:25 -0000      1.313
+++ proprietary-surveillance.it.po      21 Jul 2019 16:29:30 -0000      1.314
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -3881,6 +3881,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Alexa collects a lot more information from users than is necessary "
 "for correct functioning (time, location, recordings made without a "
 "legitimate prompt), and sends it to Amazon's servers, which store it "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary-surveillance.ja-diff.html       15 Jul 2019 10:02:25 -0000      
1.167
+++ proprietary-surveillance.ja-diff.html       21 Jul 2019 16:29:30 -0000      
1.168
@@ -2447,6 +2447,21 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google "Assistant" records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google "Assistant" uses proprietary software, there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905061"&gt;
     &lt;p&gt;Amazon Alexa collects a lot more information from users
     than is necessary for correct functioning (time, location,
@@ -3131,7 +3146,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:25 $
+$Date: 2019/07/21 16:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- proprietary-surveillance.ja.po      15 Jul 2019 10:02:25 -0000      1.292
+++ proprietary-surveillance.ja.po      21 Jul 2019 16:29:30 -0000      1.293
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3005,6 +3005,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Alexa collects a lot more information from users than is necessary "
 "for correct functioning (time, location, recordings made without a "
 "legitimate prompt), and sends it to Amazon's servers, which store it "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary-surveillance.pot        15 Jul 2019 10:02:25 -0000      1.234
+++ proprietary-surveillance.pot        21 Jul 2019 16:29:30 -0000      1.235
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2370,6 +2370,28 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a "
+"href=\"https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/\";>even
 "
+"when it is not supposed to listen</a>. Thus, when one of Google's "
+"subcontractors discloses a thousand confidential voice recordings, users "
+"were easily identified from these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Alexa collects a lot more information from users than is necessary "
 "for correct functioning (time, location, recordings made without a "
 "legitimate prompt), and sends it to Amazon's servers, which store it "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.548
retrieving revision 1.549
diff -u -b -r1.548 -r1.549
--- proprietary-surveillance.ru.po      15 Jul 2019 11:01:09 -0000      1.548
+++ proprietary-surveillance.ru.po      21 Jul 2019 16:29:30 -0000      1.549
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3450,6 +3451,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Alexa collects a lot more information from users than is necessary "
 "for correct functioning (time, location, recordings made without a "
 "legitimate prompt), and sends it to Amazon's servers, which store it "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary.de-diff.html    17 Jul 2019 10:01:41 -0000      1.107
+++ proprietary.de-diff.html    21 Jul 2019 16:29:30 -0000      1.108
@@ -186,6 +186,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google "Assistant" records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google "Assistant" uses proprietary software, there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907090"&gt;
     &lt;p&gt;Resourceful children figured out how to &lt;a
     href="https://www.bbc.co.uk/news/technology-48908766"&gt; empty their
@@ -239,25 +254,6 @@
     price,&rdquo; which is a usage we should avoid. We recommend saying
     &ldquo;gratis&rdquo; instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209800000"&gt;
-    &lt;p&gt;The developers of gratis mobile games apply &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    behavioral manipulation techniques&lt;/a&gt; to &lt;a
-    href="https://www.psychguides.com/interact/the-psychology-of-freemium/"&gt;
-    turn their products into slot machines&lt;/a&gt;. This is clearly described
-    in an infographic.&lt;/p&gt;
-
-    &lt;p&gt;The revenue generated by these games is directly related to the
-    number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
-    to the amount of money they are willing to spend. Thus developers
-    carefully study the behavior of millions of users to increase the
-    addictiveness of their games.&lt;/p&gt;
-
-    &lt;p&gt;Unfortunately, the article uses &ldquo;free&rdquo; to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
-    instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -318,7 +314,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary.de.po   17 Jul 2019 10:01:41 -0000      1.149
+++ proprietary.de.po   21 Jul 2019 16:29:30 -0000      1.150
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -439,6 +439,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/";
 "technology-48908766\"> empty their parents' bank account</a> buying packs of "
 "special players for an Electronic Arts soccer game."
@@ -505,29 +528,6 @@
 "is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
-"&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary.es.po   18 Jul 2019 09:59:41 -0000      1.187
+++ proprietary.es.po   21 Jul 2019 16:29:30 -0000      1.188
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -303,6 +304,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/";
 "technology-48908766\"> empty their parents' bank account</a> buying packs of "
 "special players for an Electronic Arts soccer game."
@@ -400,41 +424,6 @@
 "El artículo utiliza el término <cite>«free»</cite> para significar 
«precio "
 "cero», algo que debemos evitar. Recomendamos en su lugar decir: «gratis»."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-"Los desarrolladores de juegos gratuitos para móviles emplean <a href=\"/"
-"proprietary/proprietary-addictions.html#addictiveness\">técnicas de "
-"manipulación conductual</a> para <a href=\"https://www.psychguides.com/";
-"interact/the-psychology-of-freemium/\">convertir sus productos en máquinas "
-"tragamonedas</a>. Esto se describe claramente en la infografía del 
artículo."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-"Las ganancias generadas por estos juegos están directamente relacionadas con 
"
-"el número de jugadores con una fuerte adicción (llamados «ballenas») y la 
"
-"cantidad de dinero que están dispuestos a gastar. Así los desarrolladores "
-"estudian minuciosamente el comportamiento de millones de usuarios a fin de "
-"incrementar la adictividad de sus juegos."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
-"&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-"Desafortunadamente, el artículo utiliza el término <cite>«free»</cite> 
para "
-"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -514,6 +503,40 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
+#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
+#~ "psychology-of-freemium/\"> turn their products into slot machines</a>. "
+#~ "This is clearly described in an infographic."
+#~ msgstr ""
+#~ "Los desarrolladores de juegos gratuitos para móviles emplean <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\">técnicas de "
+#~ "manipulación conductual</a> para <a href=\"https://www.psychguides.com/";
+#~ "interact/the-psychology-of-freemium/\">convertir sus productos en "
+#~ "máquinas tragamonedas</a>. Esto se describe claramente en la infografía "
+#~ "del artículo."
+
+#~ msgid ""
+#~ "The revenue generated by these games is directly related to the number of "
+#~ "strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount "
+#~ "of money they are willing to spend. Thus developers carefully study the "
+#~ "behavior of millions of users to increase the addictiveness of their "
+#~ "games."
+#~ msgstr ""
+#~ "Las ganancias generadas por estos juegos están directamente relacionadas "
+#~ "con el número de jugadores con una fuerte adicción (llamados 
«ballenas») "
+#~ "y la cantidad de dinero que están dispuestos a gastar. Así los "
+#~ "desarrolladores estudian minuciosamente el comportamiento de millones de "
+#~ "usuarios a fin de incrementar la adictividad de sus juegos."
+
+#~ msgid ""
+#~ "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#~ "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+#~ msgstr ""
+#~ "Desafortunadamente, el artículo utiliza el término <cite>«free»</cite> 
"
+#~ "para significar «precio cero». Recomendamos en su lugar decir: 
«gratis»."
+
+#~ msgid ""
 #~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/";
 #~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
 #~ "instrument of surveillance</a>. It lets thousands of trackers invade "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary.fr.po   17 Jul 2019 10:09:54 -0000      1.229
+++ proprietary.fr.po   21 Jul 2019 16:29:30 -0000      1.230
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2019-07-17 12:09+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -299,6 +300,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/";
 "technology-48908766\"> empty their parents' bank account</a> buying packs of "
 "special players for an Electronic Arts soccer game."
@@ -398,41 +422,6 @@
 "de « gratuit », ce qui est à éviter. Nous recommandons de le remplacer 
par "
 "<cite>gratis</cite>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-"Les développeurs de jeux gratuits pour mobiles appliquent des <a href=\"/"
-"proprietary/proprietary-addictions.html#addictiveness\">techniques de "
-"manipulation comportementale</a> pour <a href=\"https://www.psychguides.com/";
-"interact/the-psychology-of-freemium/\">transformer leurs produits en "
-"machines à sous</a>. Une infographie l'explique clairement."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-"Le revenu généré par ces jeux dépend directement du nombre de joueurs "
-"fortement compulsifs (on les appelle des « baleines ») et des sommes 
qu'ils "
-"sont disposés à dépenser. Les développeurs étudient donc soigneusement 
le "
-"comportement de millions d'utilisateurs pour augmenter le pouvoir addictif "
-"de leurs jeux."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
-"&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-"Malheureusement, cet article utilise le mot <cite>free</cite> dans le sens "
-"de « gratuit ». Nous vous recommandons de dire plutôt 
<cite>gratis</cite>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,3 +495,37 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
+#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
+#~ "psychology-of-freemium/\"> turn their products into slot machines</a>. "
+#~ "This is clearly described in an infographic."
+#~ msgstr ""
+#~ "Les développeurs de jeux gratuits pour mobiles appliquent des <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\">techniques de "
+#~ "manipulation comportementale</a> pour <a href=\"https://www.psychguides.";
+#~ "com/interact/the-psychology-of-freemium/\">transformer leurs produits en "
+#~ "machines à sous</a>. Une infographie l'explique clairement."
+
+#~ msgid ""
+#~ "The revenue generated by these games is directly related to the number of "
+#~ "strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount "
+#~ "of money they are willing to spend. Thus developers carefully study the "
+#~ "behavior of millions of users to increase the addictiveness of their "
+#~ "games."
+#~ msgstr ""
+#~ "Le revenu généré par ces jeux dépend directement du nombre de joueurs "
+#~ "fortement compulsifs (on les appelle des « baleines ») et des sommes "
+#~ "qu'ils sont disposés à dépenser. Les développeurs étudient donc "
+#~ "soigneusement le comportement de millions d'utilisateurs pour augmenter "
+#~ "le pouvoir addictif de leurs jeux."
+
+#~ msgid ""
+#~ "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#~ "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+#~ msgstr ""
+#~ "Malheureusement, cet article utilise le mot <cite>free</cite> dans le "
+#~ "sens de « gratuit ». Nous vous recommandons de dire plutôt 
<cite>gratis</"
+#~ "cite>."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.it-diff.html    17 Jul 2019 10:01:41 -0000      1.119
+++ proprietary.it-diff.html    21 Jul 2019 16:29:31 -0000      1.120
@@ -185,6 +185,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google "Assistant" records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google "Assistant" uses proprietary software, there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907090"&gt;
     &lt;p&gt;Resourceful children figured out how to &lt;a
     href="https://www.bbc.co.uk/news/technology-48908766"&gt; empty their
@@ -238,25 +253,6 @@
     price,&rdquo; which is a usage we should avoid. We recommend saying
     &ldquo;gratis&rdquo; instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209800000"&gt;
-    &lt;p&gt;The developers of gratis mobile games apply &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    behavioral manipulation techniques&lt;/a&gt; to &lt;a
-    href="https://www.psychguides.com/interact/the-psychology-of-freemium/"&gt;
-    turn their products into slot machines&lt;/a&gt;. This is clearly described
-    in an infographic.&lt;/p&gt;
-
-    &lt;p&gt;The revenue generated by these games is directly related to the
-    number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
-    to the amount of money they are willing to spend. Thus developers
-    carefully study the behavior of millions of users to increase the
-    addictiveness of their games.&lt;/p&gt;
-
-    &lt;p&gt;Unfortunately, the article uses &ldquo;free&rdquo; to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
-    instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -317,7 +313,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary.it.po   17 Jul 2019 10:01:41 -0000      1.158
+++ proprietary.it.po   21 Jul 2019 16:29:31 -0000      1.159
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/";
 "technology-48908766\"> empty their parents' bank account</a> buying packs of "
 "special players for an Electronic Arts soccer game."
@@ -509,29 +532,6 @@
 "is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
-"&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.ja-diff.html    17 Jul 2019 10:01:41 -0000      1.122
+++ proprietary.ja-diff.html    21 Jul 2019 16:29:31 -0000      1.123
@@ -182,6 +182,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google "Assistant" records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google "Assistant" uses proprietary software, there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907090"&gt;
     &lt;p&gt;Resourceful children figured out how to &lt;a
     href="https://www.bbc.co.uk/news/technology-48908766"&gt; empty their
@@ -235,25 +250,6 @@
     price,&rdquo; which is a usage we should avoid. We recommend saying
     &ldquo;gratis&rdquo; instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209800000"&gt;
-    &lt;p&gt;The developers of gratis mobile games apply &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    behavioral manipulation techniques&lt;/a&gt; to &lt;a
-    href="https://www.psychguides.com/interact/the-psychology-of-freemium/"&gt;
-    turn their products into slot machines&lt;/a&gt;. This is clearly described
-    in an infographic.&lt;/p&gt;
-
-    &lt;p&gt;The revenue generated by these games is directly related to the
-    number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
-    to the amount of money they are willing to spend. Thus developers
-    carefully study the behavior of millions of users to increase the
-    addictiveness of their games.&lt;/p&gt;
-
-    &lt;p&gt;Unfortunately, the article uses &ldquo;free&rdquo; to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
-    instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -314,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary.ja.po   17 Jul 2019 10:01:41 -0000      1.142
+++ proprietary.ja.po   21 Jul 2019 16:29:31 -0000      1.143
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -307,6 +307,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/";
 "technology-48908766\"> empty their parents' bank account</a> buying packs of "
 "special players for an Electronic Arts soccer game."
@@ -373,29 +396,6 @@
 "is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
-"&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.nl-diff.html    17 Jul 2019 10:01:41 -0000      1.119
+++ proprietary.nl-diff.html    21 Jul 2019 16:29:31 -0000      1.120
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -185,6 +185,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google "Assistant" records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google "Assistant" uses proprietary software, there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907090"&gt;
     &lt;p&gt;Resourceful children figured out how to &lt;a
     href="https://www.bbc.co.uk/news/technology-48908766"&gt; empty their
@@ -238,25 +253,6 @@
     price,&rdquo; which is a usage we should avoid. We recommend saying
     &ldquo;gratis&rdquo; instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209800000"&gt;
-    &lt;p&gt;The developers of gratis mobile games apply &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    behavioral manipulation techniques&lt;/a&gt; to &lt;a
-    href="https://www.psychguides.com/interact/the-psychology-of-freemium/"&gt;
-    turn their products into slot machines&lt;/a&gt;. This is clearly described
-    in an infographic.&lt;/p&gt;
-
-    &lt;p&gt;The revenue generated by these games is directly related to the
-    number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
-    to the amount of money they are willing to spend. Thus developers
-    carefully study the behavior of millions of users to increase the
-    addictiveness of their games.&lt;/p&gt;
-
-    &lt;p&gt;Unfortunately, the article uses &ldquo;free&rdquo; to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
-    instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -317,7 +313,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.nl.po   17 Jul 2019 10:01:41 -0000      1.130
+++ proprietary.nl.po   21 Jul 2019 16:29:31 -0000      1.131
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/";
 "technology-48908766\"> empty their parents' bank account</a> buying packs of "
 "special players for an Electronic Arts soccer game."
@@ -502,29 +525,6 @@
 "is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
-"&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary.pl-diff.html    17 Jul 2019 10:01:41 -0000      1.137
+++ proprietary.pl-diff.html    21 Jul 2019 16:29:31 -0000      1.138
@@ -183,6 +183,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google "Assistant" records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google "Assistant" uses proprietary software, there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907090"&gt;
     &lt;p&gt;Resourceful children figured out how to &lt;a
     href="https://www.bbc.co.uk/news/technology-48908766"&gt; empty their
@@ -236,25 +251,6 @@
     price,&rdquo; which is a usage we should avoid. We recommend saying
     &ldquo;gratis&rdquo; instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209800000"&gt;
-    &lt;p&gt;The developers of gratis mobile games apply &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    behavioral manipulation techniques&lt;/a&gt; to &lt;a
-    href="https://www.psychguides.com/interact/the-psychology-of-freemium/"&gt;
-    turn their products into slot machines&lt;/a&gt;. This is clearly described
-    in an infographic.&lt;/p&gt;
-
-    &lt;p&gt;The revenue generated by these games is directly related to the
-    number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
-    to the amount of money they are willing to spend. Thus developers
-    carefully study the behavior of millions of users to increase the
-    addictiveness of their games.&lt;/p&gt;
-
-    &lt;p&gt;Unfortunately, the article uses &ldquo;free&rdquo; to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
-    instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -315,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.pl.po   17 Jul 2019 10:01:41 -0000      1.125
+++ proprietary.pl.po   21 Jul 2019 16:29:31 -0000      1.126
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/";
 "technology-48908766\"> empty their parents' bank account</a> buying packs of "
 "special players for an Electronic Arts soccer game."
@@ -585,29 +608,6 @@
 "is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
-"&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.pot     17 Jul 2019 10:01:41 -0000      1.122
+++ proprietary.pot     21 Jul 2019 16:29:31 -0000      1.123
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,28 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a "
+"href=\"https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/\";>even
 "
+"when it is not supposed to listen</a>. Thus, when one of Google's "
+"subcontractors discloses a thousand confidential voice recordings, users "
+"were easily identified from these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a "
 "href=\"https://www.bbc.co.uk/news/technology-48908766\";> empty their "
 "parents' bank account</a> buying packs of special players for an Electronic "
@@ -318,30 +340,6 @@
 "instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a "
-"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> behavioral "
-"manipulation techniques</a> to <a "
-"href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/\";> "
-"turn their products into slot machines</a>. This is clearly described in an "
-"infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
-"price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary.pt-br.po        19 Jul 2019 13:29:57 -0000      1.187
+++ proprietary.pt-br.po        21 Jul 2019 16:29:31 -0000      1.188
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2019-07-19 09:30-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -296,6 +297,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/";
 "technology-48908766\"> empty their parents' bank account</a> buying packs of "
 "special players for an Electronic Arts soccer game."
@@ -394,41 +418,6 @@
 "O artigo usa “<i lang=\"en\">free</i>” no sentido de “preço zero”, 
uso este "
 "que nós devemos evitar. Recomendamos dizer “grátis”."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-"Os desenvolvedores de jogos grátis para dispositivos móveis aplicam <a 
href="
-"\"/proprietary/proprietary-addictions.html#addictiveness\"> técnicas de "
-"manipulação de comportamento</a> para <a 
href=\"https://www.psychguides.com/";
-"interact/the-psychology-of-freemium/\"> transformar seus produtos em "
-"máquinas de caça-níquel</a>. Isso está claramente descrito em um 
infográfico."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-"O lucro gerado por esses jogos está diretamente relacionado ao número de "
-"jogadores fortemente viciados (chamados de “baleias”) e à quantidade de "
-"dinheiro que eles têm a intenção de gastar. Então, os desenvolvedores "
-"estudam cuidadosamente o comportamento de milhões de usuários para aumentar 
"
-"o vício em seus jogos."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
-"&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-"Infelizmente, o artigo usa “<i lang=\"en\">free</i>” no sentido de 
“preço "
-"zero”. Nós recomendamos dizer “grátis”."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -504,6 +493,40 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
+#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
+#~ "psychology-of-freemium/\"> turn their products into slot machines</a>. "
+#~ "This is clearly described in an infographic."
+#~ msgstr ""
+#~ "Os desenvolvedores de jogos grátis para dispositivos móveis aplicam <a "
+#~ "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> técnicas 
"
+#~ "de manipulação de comportamento</a> para <a href=\"https://www.";
+#~ "psychguides.com/interact/the-psychology-of-freemium/\"> transformar seus "
+#~ "produtos em máquinas de caça-níquel</a>. Isso está claramente descrito 
em "
+#~ "um infográfico."
+
+#~ msgid ""
+#~ "The revenue generated by these games is directly related to the number of "
+#~ "strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount "
+#~ "of money they are willing to spend. Thus developers carefully study the "
+#~ "behavior of millions of users to increase the addictiveness of their "
+#~ "games."
+#~ msgstr ""
+#~ "O lucro gerado por esses jogos está diretamente relacionado ao número de 
"
+#~ "jogadores fortemente viciados (chamados de “baleias”) e à quantidade 
de "
+#~ "dinheiro que eles têm a intenção de gastar. Então, os desenvolvedores "
+#~ "estudam cuidadosamente o comportamento de milhões de usuários para "
+#~ "aumentar o vício em seus jogos."
+
+#~ msgid ""
+#~ "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#~ "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+#~ msgstr ""
+#~ "Infelizmente, o artigo usa “<i lang=\"en\">free</i>” no sentido de 
“preço "
+#~ "zero”. Nós recomendamos dizer “grátis”."
+
+#~ msgid ""
 #~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/";
 #~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
 #~ "instrument of surveillance</a>. It lets thousands of trackers invade "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- proprietary.ru.po   17 Jul 2019 15:28:18 -0000      1.265
+++ proprietary.ru.po   21 Jul 2019 16:29:31 -0000      1.266
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/";
 "technology-48908766\"> empty their parents' bank account</a> buying packs of "
 "special players for an Electronic Arts soccer game."
@@ -400,41 +424,6 @@
 "В статье слово &ldquo;свободный&rdquo; 
используется в смысле нулевой цены. "
 "Мы рекомендуем вместо этого говорить 
&ldquo;бесплатный&rdquo;."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-"Разработчики бесплатных мобильных игр 
применяют <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> приемы 
манипуляции поведением</"
-"a>, чтобы <a 
href=\"https://www.psychguides.com/interact/the-psychology-of-";
-"freemium/\"> превратить свои продукты в 
автоматы для азартных игр</a>. Это "
-"наглядно показано на иллюстрации."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-"Доход, создаваемый этими играми, напрямую 
связан с числом сильно зависимых "
-"игроков (называемых &ldquo;китами&rdquo;) и с 
количеством денег, которое они "
-"готовы тратить. Итак, разработчики 
тщательно изучают поведение миллионов "
-"пользователей, чтобы их игры вырабатывали 
более сильную зависимость."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
-"&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-"К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в значении "
-"&ldquo;нулевой цены&rdquo;. Мы рекомендуем 
вместо этого говорить &ldquo;"
-"бесплатный&rdquo;."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -514,6 +503,40 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
+#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
+#~ "psychology-of-freemium/\"> turn their products into slot machines</a>. "
+#~ "This is clearly described in an infographic."
+#~ msgstr ""
+#~ "Разработчики бесплатных мобильных игр 
применяют <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> приемы 
манипуляции "
+#~ "поведением</a>, чтобы <a 
href=\"https://www.psychguides.com/interact/the-";
+#~ "psychology-of-freemium/\"> превратить свои продукты 
в автоматы для "
+#~ "азартных игр</a>. Это наглядно показано на 
иллюстрации."
+
+#~ msgid ""
+#~ "The revenue generated by these games is directly related to the number of "
+#~ "strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount "
+#~ "of money they are willing to spend. Thus developers carefully study the "
+#~ "behavior of millions of users to increase the addictiveness of their "
+#~ "games."
+#~ msgstr ""
+#~ "Доход, создаваемый этими играми, 
напрямую связан с числом сильно "
+#~ "зависимых игроков (называемых 
&ldquo;китами&rdquo;) и с количеством "
+#~ "денег, которое они готовы тратить. Итак, 
разработчики тщательно изучают "
+#~ "поведение миллионов пользователей, 
чтобы их игры вырабатывали более "
+#~ "сильную зависимость."
+
+#~ msgid ""
+#~ "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#~ "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+#~ msgstr ""
+#~ "К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в "
+#~ "значении &ldquo;нулевой цены&rdquo;. Мы 
рекомендуем вместо этого говорить "
+#~ "&ldquo;бесплатный&rdquo;."
+
+#~ msgid ""
 #~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/";
 #~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
 #~ "instrument of surveillance</a>. It lets thousands of trackers invade "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.zh-tw-diff.html 17 Jul 2019 10:01:41 -0000      1.97
+++ proprietary.zh-tw-diff.html 21 Jul 2019 16:29:31 -0000      1.98
@@ -186,6 +186,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google "Assistant" records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google "Assistant" uses proprietary software, there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907090"&gt;
     &lt;p&gt;Resourceful children figured out how to &lt;a
     href="https://www.bbc.co.uk/news/technology-48908766"&gt; empty their
@@ -239,25 +254,6 @@
     price,&rdquo; which is a usage we should avoid. We recommend saying
     &ldquo;gratis&rdquo; instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209800000"&gt;
-    &lt;p&gt;The developers of gratis mobile games apply &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    behavioral manipulation techniques&lt;/a&gt; to &lt;a
-    href="https://www.psychguides.com/interact/the-psychology-of-freemium/"&gt;
-    turn their products into slot machines&lt;/a&gt;. This is clearly described
-    in an infographic.&lt;/p&gt;
-
-    &lt;p&gt;The revenue generated by these games is directly related to the
-    number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
-    to the amount of money they are willing to spend. Thus developers
-    carefully study the behavior of millions of users to increase the
-    addictiveness of their games.&lt;/p&gt;
-
-    &lt;p&gt;Unfortunately, the article uses &ldquo;free&rdquo; to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
-    instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -318,7 +314,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary.zh-tw.po        17 Jul 2019 10:01:41 -0000      1.108
+++ proprietary.zh-tw.po        21 Jul 2019 16:29:31 -0000      1.109
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/";
 "technology-48908766\"> empty their parents' bank account</a> buying packs of "
 "special players for an Electronic Arts soccer game."
@@ -416,29 +439,6 @@
 "is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called &ldquo;whales&rdquo;) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
-"&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- pt-br.po    21 Jul 2019 05:59:02 -0000      1.143
+++ pt-br.po    21 Jul 2019 16:29:31 -0000      1.144
@@ -3590,6 +3590,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- ru.po       21 Jul 2019 05:59:02 -0000      1.245
+++ ru.po       21 Jul 2019 16:29:31 -0000      1.246
@@ -4667,6 +4667,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- zh-tw.po    21 Jul 2019 05:59:02 -0000      1.112
+++ zh-tw.po    21 Jul 2019 16:29:31 -0000      1.113
@@ -3264,6 +3264,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://";
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice.  It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-";
 "chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
 "surveillance</a>. It lets thousands of trackers invade users' computers and "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]