www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Tue, 30 Jul 2019 04:29:20 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/07/30 04:29:20

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po pt-br.po ru.po 
                         zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.457&r2=1.458
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.551&r2=1.552
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.114&r2=1.115

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- de.po       21 Jul 2019 17:00:25 -0000      1.115
+++ de.po       30 Jul 2019 08:29:17 -0000      1.116
@@ -5697,9 +5697,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- es.po       22 Jul 2019 10:29:34 -0000      1.156
+++ es.po       30 Jul 2019 08:29:17 -0000      1.157
@@ -4853,10 +4853,19 @@
 "para proteger la privacidad de los usuarios."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# | 
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 "Google rastrea los movimientos de los teléfonos Android, y a veces <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
@@ -11024,6 +11033,15 @@
 "procesadores Intel incorporarán software tirano</a>."
 
 #~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google rastrea los movimientos de los teléfonos Android, y a veces <a "
+#~ "href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\">guarda los datos durante años</a>."
+
+#~ msgid ""
 #~ "A Motorola phone <a href=\"http://www.itproportal.com/2013/07/25/";
 #~ "motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"
 #~ "\"> listens for voice all the time</a>."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- fr.po       21 Jul 2019 17:33:20 -0000      1.199
+++ fr.po       30 Jul 2019 08:29:17 -0000      1.200
@@ -4767,10 +4767,19 @@
 "modifications améliorant la protection de la vie privée."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# | 
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 "Google piste les téléphones Android et <a href=\"https://www.nytimes.com/";
 "interactive/2019/04/13/us/google-location-tracking-police.html\">sauvegarde "
@@ -10672,3 +10681,12 @@
 msgstr ""
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>Les "
 "processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google piste les téléphones Android et <a 
href=\"https://www.nytimes.com/";
+#~ "interactive/2019/04/13/us/google-location-tracking-police.html"
+#~ "\">sauvegarde les données, parfois pendant des années</a>."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- it.po       21 Jul 2019 17:00:26 -0000      1.115
+++ it.po       30 Jul 2019 08:29:17 -0000      1.116
@@ -5378,9 +5378,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- ja.po       27 Jul 2019 16:34:30 -0000      1.122
+++ ja.po       30 Jul 2019 08:29:17 -0000      1.123
@@ -4120,9 +4120,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -4296,10 +4296,9 @@
 "www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-"
 "always-on-future-of-android/\"> listens for voice all the time</a>."
 msgstr ""
-"モトローラの携帯電話は<a 
href=\"https://web.archive.org/web/20170629175629/http://";
-"www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-"
-"always-on-future-of-android/\">常"
-"時、音声を聞いています</a>。"
+"モトローラの携帯電話は<a 
href=\"https://web.archive.org/web/20170629175629/";
+"http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-";
+"the-always-on-future-of-android/\">常時、音声を聞いています</a>。"
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-google.de-diff.html 21 Jul 2019 17:00:26 -0000      1.31
+++ malware-google.de-diff.html 30 Jul 2019 08:29:17 -0000      1.32
@@ -378,7 +378,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Goggle apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
@@ -662,7 +663,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/21 17:00:26 $
+$Date: 2019/07/30 08:29:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-google.de.po        21 Jul 2019 17:00:27 -0000      1.46
+++ malware-google.de.po        30 Jul 2019 08:29:18 -0000      1.47
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -686,9 +686,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-google.es.po        22 Jul 2019 10:18:07 -0000      1.19
+++ malware-google.es.po        30 Jul 2019 08:29:18 -0000      1.20
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-22 12:16+0200\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: 2019-07-22 12:11+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-30 08:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -565,10 +566,19 @@
 "para proteger la privacidad de los usuarios."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# | 
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 "Google rastrea los movimientos de los teléfonos Android, y a veces <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";

Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-google.fr.po        21 Jul 2019 17:33:20 -0000      1.76
+++ malware-google.fr.po        30 Jul 2019 08:29:18 -0000      1.77
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: 2019-07-21 19:12+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-30 08:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -568,10 +569,19 @@
 "modifications améliorant la protection de la vie privée."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# | 
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 "Google piste les téléphones Android et <a href=\"https://www.nytimes.com/";
 "interactive/2019/04/13/us/google-location-tracking-police.html\">sauvegarde "

Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-google.pot  21 Jul 2019 17:00:27 -0000      1.42
+++ malware-google.pot  30 Jul 2019 08:29:18 -0000      1.43
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -398,7 +398,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a "
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a "
 
"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
 "
 "saves the data for years</a>."
 msgstr ""

Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- malware-google.ru.po        21 Jul 2019 17:29:00 -0000      1.96
+++ malware-google.ru.po        30 Jul 2019 08:29:18 -0000      1.97
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: 2018-10-05 09:03+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-30 08:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -566,10 +567,19 @@
 "защиты личной жизни пользователей."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# | 
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 "Google отслеживает перемещения телефонов на 
базе Android, и иногда <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- nl.po       21 Jul 2019 17:00:27 -0000      1.115
+++ nl.po       30 Jul 2019 08:29:18 -0000      1.116
@@ -3922,9 +3922,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- pl.po       21 Jul 2019 17:00:27 -0000      1.115
+++ pl.po       30 Jul 2019 08:29:18 -0000      1.116
@@ -3375,9 +3375,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- pot 21 Jul 2019 17:00:27 -0000      1.114
+++ pot 30 Jul 2019 08:29:18 -0000      1.115
@@ -3185,9 +3185,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary-surveillance.de-diff.html       21 Jul 2019 17:00:27 -0000      
1.87
+++ proprietary-surveillance.de-diff.html       30 Jul 2019 08:29:18 -0000      
1.88
@@ -925,334 +925,288 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
 href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing the iOS DRM.&lt;/p&gt;
+      illegal</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201812060"&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>study how iOS cr...apps spy on 
users&lt;/a&gt;, because this
+      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    what</em></ins></span> the <span class="removed"><del><strong>iOS 
DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was 
for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;In</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi and Bluetooth</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>movements of Android 
phones,</em></ins></span> and <span class="removed"><del><strong>Bluetooth the
-      obvious way</strong></del></span> <span 
class="inserted"><ins><em>sometimes</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
+    &lt;p&gt;An Android phone was observed to track location even while
+    in airplane mode. It didn't send</em></ins></span> the
+      <span class="removed"><del><strong>obvious way</strong></del></span> 
<span class="inserted"><ins><em>location data while in
+    airplane mode.  Instead,</em></ins></span> &lt;a
  <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
       doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you 
want</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to be <span 
class="removed"><del><strong>spied on&rdquo;.&lt;/p&gt;
+      A more advanced way really does turn</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
+    it saved up the data, and sent</em></ins></span> them <span 
class="removed"><del><strong>off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
+    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
       &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>responsible for sending</em></ins></span>
-    the <span class="removed"><del><strong>phone is snooping on
+      taken. Users would have no way to tell whether</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the phone <span class="removed"><del><strong>is snooping on
       them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
iMessage</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's</em></ins></span> app <span 
class="removed"><del><strong>on iThings</strong></del></span> <span 
class="inserted"><ins><em>got &ldquo;consent&rdquo; to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+  &lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending</em></ins></span> lots of <span 
class="removed"><del><strong>personal</strong></del></span> data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android</em></ins></span> phone <span 
class="removed"><del><strong>number that</strong></del></span> <span 
class="inserted"><ins><em>was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>location 
data while in
-    airplane mode.  Instead, &lt;a
-    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
+    &lt;p&gt;Google Play (a component of Android)</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</em></ins></span> the <span class="removed"><del><strong>server 
records these numbers for at least 30
+        days.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>users' movements</em></ins></span> without <span 
class="removed"><del><strong>giving a valid email address</strong></del></span> 
<span class="inserted"><ins><em>their permission&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;</em></ins></span>
-    even <span class="removed"><del><strong>gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>when &ldquo;location services&rdquo; are turned 
off, even when</em></ins></span>
-    the <span class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>receiving the code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>location 
tracking, you must
+    disable Google Play itself</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>completely stop</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
+      &lt;a class="not-a-duplicate" 
         href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of their 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold</em></ins></span> with <span class="removed"><del><strong>third 
parties.&lt;/p&gt;
+       behavioral and location information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>tracking.  This is
+    yet another example</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>spyware sending lots of data</em></ins></span> to 
<span class="removed"><del><strong>Apple's servers all</strong></del></span> 
<span class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>nonfree software pretending</em></ins></span> to 
<span class="removed"><del><strong>Apple's servers all</strong></del></span> 
<span class="inserted"><ins><em>obey</em></ins></span> the <span 
class="removed"><del><strong>photos</strong></del></span> <span 
class="inserted"><ins><em>user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the <span class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
+    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;,</em></ins></span> and
+      <span class="removed"><del><strong>videos</strong></del></span> they 
<span class="removed"><del><strong>make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video</strong></del></span> 
<span class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if</em></ins></span> you <span 
class="removed"><del><strong>take,</strong></del></span> <span 
class="inserted"><ins><em>disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>keeps them up to date on all your devices.
-      Any edits</strong></del></span> <span class="inserted"><ins><em>location 
tracking,</em></ins></span> you <span class="removed"><del><strong>make are 
automatically updated everywhere. [...]
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up to date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
     &lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>must
-    disable Google Play itself to completely stop</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>tracking.  This</em></ins></span> is <span 
class="removed"><del><strong>a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
-      surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this to
-      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span>
-    <span class="inserted"><ins><em>yet another example</em></ins></span> of 
<span class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to 
break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>nonfree 
software pretending</em></ins></span> to <span class="removed"><del><strong>get 
at them, but NSA can access any of them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>send so much data 
that their
+    transmission</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>a substantial expense for users.  Said 
transmission,
+    not wanted or requested</em></ins></span> by the
+      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
+    of <span class="removed"><del><strong>iOS&lt;/a&gt;.</strong></del></span> 
<span class="inserted"><ins><em>some kind.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201403120"&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201308010"&gt;
+    &lt;p&gt;Spyware in Android phones (and Windows? 
laptops):</em></ins></span> The <span class="removed"><del><strong>term 
&ldquo;cloud&rdquo;</strong></del></span> <span class="inserted"><ins><em>Wall 
Street
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone in Android phones
+    and laptops&lt;/a&gt;.  (I suspect this</em></ins></span> means
+      <span class="removed"><del><strong>&ldquo;please don't ask 
where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>Windows laptops.)  Here</em></ins></span> is <span 
class="removed"><del><strong>a way to</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware is present in some Android devices when they are
+    sold.  Some Motorola phones, made when this company was 
owned</em></ins></span>
+    by <span class="removed"><del><strong>default so it still counts 
as</strong></del></span> <span class="inserted"><ins><em>Google, 
use</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>modified version</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Android that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any of them 
through</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>obey</em></ins></span> the <span 
class="inserted"><ins><em>user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all</em></ins></span> the <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+  &lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span class="removed"><del><strong>class="not-a-duplicate"
             
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>get other info too.&lt;/p&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>iThing is,
+      and get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>they send so much data that their
-    transmission</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature</strong></del></span> <span 
class="inserted"><ins><em>substantial expense</em></ins></span> for <span 
class="removed"><del><strong>web sites to track users, which is
+  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>personal details of users that install the 
app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>also a feature 
for web sites</strong></del></span> <span class="inserted"><ins><em>not 
enough</em></ins></span> to <span class="removed"><del><strong>track users, 
which is
       &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled</strong></del></span> <span class="inserted"><ins><em>users.  
Said transmission,
-    not wanted or requested</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
       is still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The iThing also
       &lt;a
 
href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="removed"><del><strong>can be
       turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should 
clearly</em></ins></span> and <span class="removed"><del><strong>regularly does,
       &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> the 
<span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user, clearly must constitute spying
-    of some kind.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any 
file</em></ins></span> on <span 
class="removed"><del><strong>all</strong></del></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>system.&lt;/p&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
-    Journal (in</em></ins></span> an <span class="removed"><del><strong>iThing,
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
+    <span class="inserted"><ins><em>honestly identify</em></ins></span> the 
<span class="removed"><del><strong>NSA snoop</strong></del></span> <span 
class="inserted"><ins><em>information it collects</em></ins></span> on <span 
class="removed"><del><strong>all the data</strong></del></span> <span 
class="inserted"><ins><em>users, instead of
+    hiding it</em></ins></span> in an <span 
class="removed"><del><strong>iThing,
       or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span> <span class="inserted"><ins><em>article blocked from 
us by a paywall) reports that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI can remotely activate the GPS and microphone</em></ins></span> in 
<span class="removed"><del><strong>popular</strong></del></span> Android <span 
class="removed"><del><strong>apps is pervasive</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span>
-    and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can</strong></del></span> <span class="inserted"><ins><em>laptops&lt;/a&gt;.  
(I suspect this means Windows laptops.)  Here is</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices</em></ins></span> when 
<span class="removed"><del><strong>&ldquo;location 
services&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>they</em></ins></span> are <span 
class="removed"><del><strong>turned off, even</strong></del></span>
-    <span class="inserted"><ins><em>sold.  Some Motorola phones, 
made</em></ins></span> when <span class="removed"><del><strong>the phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span> <span 
class="inserted"><ins><em>this company was owned
-    by Google, use a modified version</em></ins></span> of <span 
class="inserted"><ins><em>Android that &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to turn the phones
-      on and off, listen to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and web
-      browsing history, and read the contact list. This malware is designed to
-      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,
-      and they send so much data</strong></del></span> that <span 
class="removed"><del><strong>their transmission</strong></del></span> <span 
class="inserted"><ins><em>install the app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>a
-      substantial expense for users.  Said transmission,</strong></del></span> 
not <span class="removed"><del><strong>wanted or
-      requested by</strong></del></span> <span 
class="inserted"><ins><em>enough to
-    legitimize actions like this.  At this point, most users have stopped
-    reading</em></ins></span> the <span 
class="removed"><del><strong>user,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms and Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should</em></ins></span> 
clearly <span class="removed"><del><strong>must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>obscurely worded EULA.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>and
-    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, instead of
-    hiding it</em></ins></span> in <span class="removed"><del><strong>Android 
phones (and Windows? laptops): The Wall
-      Street Journal (in</strong></del></span> an <span 
class="removed"><del><strong>article blocked</strong></del></span> <span 
class="inserted"><ins><em>obscurely worded EULA.&lt;/p&gt;
-
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies</em></ins></span> from <span 
class="removed"><del><strong>us by</strong></del></span> <span 
class="inserted"><ins><em>getting this personal information in the
-    first place!&lt;/p&gt;
+    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>exist for no
+      possible purpose</strong></del></span> <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+    and</em></ins></span> other <span class="removed"><del><strong>than 
surveillance&lt;/a&gt;.  Here is</strong></del></span> <span 
class="inserted"><ins><em>companies from getting this personal information 
in</em></ins></span> the
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="removed"><del><strong>paywall)
-      reports that</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI</strong></del></span>
+    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books</em></ins></span> can <span 
class="removed"><del><strong>remotely activate the GPS and microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>contain 
JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is 
pervasive</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201603080"&gt;
+    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and
+      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on
-      <span class="removed"><del><strong>remote command and users cannot stop 
them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is to restrict</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries, &lt;a
-    
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of data <span 
class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-    needed to check DRM!&lt;/p&gt;
+    the <span class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send</em></ins></span> lots of data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>user's computer, but it does surveillance
-      too:</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get</strong></del></span>
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    report even</em></ins></span> which <span 
class="removed"><del><strong>enable them to turn the phones
+      on and off, listen to the microphone, retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware is designed to
+      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;div <span class="inserted"><ins><em>class="big-section"&gt;
+
+&lt;div class="big-section"&gt;
   &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;div</em></ins></span> class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
     reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span class="removed"><del><strong>moviepass app and 
dis-service spy on users</strong></del></span> <span 
class="inserted"><ins><em>fact that this is used for repression of forbidden 
sharing
-    makes it</em></ins></span> even more <span 
class="removed"><del><strong>than users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before and after going to</strong></del></span> 
<span class="inserted"><ins><em>vicious.&lt;/p&gt;
+    often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
-    &lt;/p&gt;
+    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>users can't delete&lt;/a&gt;,
+      and they send so much data</strong></del></span> <span 
class="inserted"><ins><em>this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates</em></ins></span> that <span 
class="removed"><del><strong>their transmission</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
+    is <span class="inserted"><ins><em>not</em></ins></span> a
+      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span 
class="inserted"><ins><em>cure</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
+      requested by</strong></del></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cure for 
the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens</strong></del></span> <span class="inserted"><ins><em>nonfree 
software. It may avoid
+    paying</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered 
driving</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
@@ -1262,275 +1216,288 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android</em></ins></span> apps can
-    <span class="removed"><del><strong>&lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;</strong></del></span>
 track <span class="removed"><del><strong>your every move&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span>
-    <span class="inserted"><ins><em>users' movements even when the user 
says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note that this article misuses the words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>allow 
them access</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Many</em></ins></span> Android <span 
class="removed"><del><strong>phones (and Windows? laptops): The Wall
+      Street Journal (in</strong></del></span> <span 
class="inserted"><ins><em>apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves</em></ins></span> an <span 
class="removed"><del><strong>article blocked from us</strong></del></span> 
<span class="inserted"><ins><em>apparently unintentional weakness in Android,
+    exploited intentionally</em></ins></span> by <span 
class="inserted"><ins><em>malicious apps.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Facebook's</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>listens all the time,</strong></del></span> <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+  &lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is 
secretly</em></ins></span> a <span class="removed"><del><strong>paywall)
+      reports that</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
-    be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
-               &lt;/p&gt;
+  &lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
+    the <span class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;
+
+    &lt;p&gt;This app is a spyware that</em></ins></span> can <span 
class="removed"><del><strong>remotely activate the GPS</strong></del></span> 
<span class="inserted"><ins><em>snoop on a lot of
+    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>contact 
list,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in</strong></del></span> <span 
class="inserted"><ins><em>run a</em></ins></span> proprietary <span 
class="removed"><del><strong>search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
-    the <span class="inserted"><ins><em>event.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command</strong></del></span>
 
-    &lt;p&gt;This</em></ins></span> app is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>a spyware that can snoop</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>a lot of
-    sensitive data, including user's location</em></ins></span> and <span 
class="inserted"><ins><em>contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>pregnancy 
monitoring apps</em></ins></span> is <span class="inserted"><ins><em>often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>use 
of</strong></del></span>
+    data <span class="removed"><del><strong>on the user's computer, but it 
does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>can easily be
+    traced back</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="removed"><del><strong>user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;A</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and</em></ins></span> pregnancy <span 
class="removed"><del><strong>test controller application not only
-  can</strong></del></span> <span class="inserted"><ins><em>monitoring apps is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span>
-    <span class="inserted"><ins><em>data is 
&ldquo;anonymized</em></ins></span> and <span class="removed"><del><strong>in 
server accounts,</strong></del></span> <span 
class="inserted"><ins><em>aggregated,&rdquo;</em></ins></span> it can
-  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after</strong></del></span> <span 
class="inserted"><ins><em>easily be
-    traced back to</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The moviepass app</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>woman who 
uses</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment</em></ins></span>
+    and <span class="removed"><del><strong>dis-service spy on 
users</strong></del></span> <span class="inserted"><ins><em>freedom to make 
their own pregnancy choices. Don't use
+    these apps,</em></ins></span> even <span class="inserted"><ins><em>if 
someone offers you a reward to do so. A
+    free-software app that does</em></ins></span> more <span 
class="removed"><del><strong>than users
+      expected. It</strong></del></span> <span class="inserted"><ins><em>or 
less the same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>after going to a movie&lt;/a&gt;.
+    &lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>surveillance is inadequate 
as</strong></del></span> <span class="inserted"><ins><em>women's rights to 
equal employment
-    and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
-        surveillance.&lt;/p&gt;
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span> <span 
class="inserted"><ins><em>reward to do so. A
-    free-software</em></ins></span> app <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> that <span 
class="removed"><del><strong>include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop</strong></del></span> <span 
class="inserted"><ins><em>does more or less the same thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>what radio 
and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>you is available from &lt;a
-    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>Twitter.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones</em></ins></span> 
and <span class="removed"><del><strong>email addresses&lt;/a&gt; in user's 
address
+      book to developer's server.  Note that this article 
misuses</strong></del></span> <span class="inserted"><ins><em>iPhones
+    running Goggle apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves</em></ins></span> the <span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a</em></ins></span> new <span class="removed"><del><strong>Magic Photo 
app</strong></del></span> <span class="inserted"><ins><em>one is being 
developed&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In addition, it 
may</strong></del></span> be <span class="removed"><del><strong>analyzing 
people's conversations</strong></del></span> <span 
class="inserted"><ins><em>responsible for sending
+    the location data</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
+    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you to share the picture you take 
according</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="removed"><del><strong>surveillance, judging 
by</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>who
-      is in</strong></del></span> <span class="inserted"><ins><em>sensitive 
data without
+    preinstalled nonfree apps that have</em></ins></span> access <span 
class="removed"><del><strong>it demands</strong></del></span> to <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>sensitive</em></ins></span> data <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>frame.&lt;/p&gt;
+    the <span class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>data, or pass it on</em></ins></span> to <span 
class="removed"><del><strong>require online</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have</em></ins></span> 
access to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span>
-    the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>network but no 
direct access</em></ins></span> to <span class="removed"><del><strong>be
-      sent across</strong></del></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
+  &lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that</strong></del></span> 
<span class="inserted"><ins><em>data, or pass</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
+        pre-install</strong></del></span> on <span 
class="removed"><del><strong>some of its phones. The app will give Verizon the 
same
+   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+   they use its search engine.&lt;/p&gt;
 
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
-    surveillance on which</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>has 
absolutely no control.&lt;/p&gt;</em></ins></span>
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>have access to</em></ins></span>
+    the <span class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to the data. This 
results in massive
+    surveillance</em></ins></span> on <span class="removed"><del><strong>only 
one phone&lt;/a&gt;, and</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> the user <span 
class="removed"><del><strong>must explicitly opt-in before the app takes 
effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>has absolutely no control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span>
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>realize that</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
-    medical condition.&lt;/p&gt;
+    send sensitive personal</em></ins></span> data to <span 
class="removed"><del><strong>a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it is <span class="removed"><del><strong>nasty.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which</em></ins></span> can <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in the phone, and in server 
accounts,</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> it <span 
class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>buried in
-    lengthy terms of service</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a 
way</strong></del></span> <span class="inserted"><ins><em>are 
difficult</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
-    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>a typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
+        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;</strong></del></span>
+    for <span class="removed"><del><strong>surveillance is inadequate as a 
protection</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising or discriminating</em></ins></span> against <span 
class="removed"><del><strong>massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people in poor
+    medical condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>apps</strong></del></span>
-    <span class="inserted"><ins><em>library</em></ins></span> for <span 
class="inserted"><ins><em>building</em></ins></span> mobile <span 
class="removed"><del><strong>devices report</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> which <span 
class="removed"><del><strong>other
-    apps the user has
-    installed.</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
-    <span class="inserted"><ins><em>way</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
-    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such</strong></del></span> <span class="inserted"><ins><em>released 
them, apparently not realizing that all the personal
+    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>Facebook, Google+ and 
Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android</em></ins></span> apps <span class="removed"><del><strong>snoop on the 
user&lt;/a&gt;. This is in addition to
-      the snooping done by the phone company,</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. 
As</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>app 
developers get
-      users</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
-  &lt;/li&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>other companies, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is in <span 
class="removed"><del><strong>the frame.&lt;/p&gt;
 
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+      &lt;p&gt;This spyware feature</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
+    Google's policies. But it</em></ins></span> seems <span 
class="inserted"><ins><em>that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across</strong></del></span> <span class="inserted"><ins><em>take 
action. This proves
+    that</em></ins></span> the <span class="removed"><del><strong>wire to 
Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
-    that</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
-      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures</strong></del></span> 
<span class="inserted"><ins><em>a development platform</em></ins></span> are 
<span class="removed"><del><strong>private
+      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+  &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902041.1"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
     &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    be</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>Google 
Play had one or more malicious functionalities, such as</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. Furthermore,
-    the user interface of most of them</em></ins></span> was <span 
class="removed"><del><strong>found</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to make <span 
class="inserted"><ins><em>uninstallation
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting</strong></del></span> <span class="inserted"><ins><em>often 
malicious ads on users, and redirecting
+    them</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>phishing sites</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>&lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example</strong></del></span> 
<span class="inserted"><ins><em>user interface</em></ins></span> of
+      <span class="removed"><del><strong>the attitude</strong></del></span> 
<span class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> <span 
class="inserted"><ins><em>them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
+    &lt;p&gt;Users should of course uninstall these 
dangerous</em></ins></span> apps <span class="removed"><del><strong>for mobile 
devices report which other</strong></del></span> <span 
class="inserted"><ins><em>if they
+    haven't yet, but they should also stay away from nonfree</em></ins></span> 
apps <span class="removed"><del><strong>the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this</strong></del></span> in
+    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry</em></ins></span> a <span class="removed"><del><strong>way that at 
least</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
+    there</em></ins></span> is <span class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing</em></ins></span> what <span 
class="removed"><del><strong>the others</strong></del></span> <span 
class="inserted"><ins><em>they really</em></ins></span> do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC 
says</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150</em></ins></span> most <span 
class="removed"><del><strong>mobile</strong></del></span> <span 
class="inserted"><ins><em>popular
+    gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for 
children don't respect privacy:</strong></del></span> <span 
class="inserted"><ins><em>in Google Play found that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws were
+    source code&mdash;often</em></ins></span> used <span 
class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>for invasive advertising&mdash;that could
+    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
+    the <span class="removed"><del><strong>user&lt;/a&gt;. 
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN 
apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in 
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that 
these articles talk about &ldquo;free
     apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1538,39 +1505,65 @@
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will do
-    with the data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
+    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>company's 
server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>OS in</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do
+    with</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about a side issue. 
What</em></ins></span> the <span class="removed"><del><strong>question of 
whether</strong></del></span> <span class="inserted"><ins><em>company does
+    with</em></ins></span> the <span class="removed"><del><strong>app 
developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps &lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>user's actions</em></ins></span> to
+      <span class="removed"><del><strong>approve sending 
personal</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same machine via
-    various apps. Some</em></ins></span> of <span 
class="inserted"><ins><em>them send Facebook detailed information about
-    the user's activities in the app; others only say that the user is
+    Facebook can correlate the</em></ins></span> data <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>it obtains from</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask</strong></del></span> <span class="inserted"><ins><em>same machine 
via
+    various apps. Some of them send Facebook detailed 
information</em></ins></span> about <span class="removed"><del><strong>sending 
it to other companies.  This shows</strong></del></span>
+    the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user's activities in the app; others only say that 
the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
+    &lt;p&gt;This spying occurs regardless</em></ins></span> of <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>user has</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</strong></del></span>
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones</em></ins></span> of <span 
class="inserted"><ins><em>users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
@@ -3532,7 +3525,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/21 17:00:27 $
+$Date: 2019/07/30 08:29:18 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- proprietary-surveillance.de.po      21 Jul 2019 17:00:27 -0000      1.302
+++ proprietary-surveillance.de.po      30 Jul 2019 08:29:18 -0000      1.303
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1599,19 +1599,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -2015,6 +2002,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android phones come with a huge number of <a href=\"https://elpais.com/";
 "elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
 "apps that have access to sensitive data without users' knowledge</a>. These "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.457
retrieving revision 1.458
diff -u -b -r1.457 -r1.458
--- proprietary-surveillance.fr.po      21 Jul 2019 17:33:20 -0000      1.457
+++ proprietary-surveillance.fr.po      30 Jul 2019 08:29:18 -0000      1.458
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: 2019-07-21 19:12+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-30 08:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1169,24 +1170,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"Google piste les téléphones Android et <a href=\"https://www.nytimes.com/";
-"interactive/2019/04/13/us/google-location-tracking-police.html\">sauvegarde "
-"les données, parfois pendant des années</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"Ce doit être un logiciel non libre présent dans le téléphone qui envoie 
ces "
-"données à Google."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -1589,6 +1572,33 @@
 "développement</a>."
 
 #. type: Content of: <ul><li><p>
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# | 
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
+msgstr ""
+"Google piste les téléphones Android et <a href=\"https://www.nytimes.com/";
+"interactive/2019/04/13/us/google-location-tracking-police.html\">sauvegarde "
+"les données, parfois pendant des années</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+"Ce doit être un logiciel non libre présent dans le téléphone qui envoie 
ces "
+"données à Google."
+
+#. type: Content of: <ul><li><p>
 msgid ""
 "Many Android phones come with a huge number of <a href=\"https://elpais.com/";
 "elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary-surveillance.it-diff.html       21 Jul 2019 17:00:27 -0000      
1.154
+++ proprietary-surveillance.it-diff.html       30 Jul 2019 08:29:18 -0000      
1.155
@@ -891,94 +891,80 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
-      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to 
turn</strong></del></span>
+  &lt;li&gt;&lt;p&gt;According</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen to</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location</strong></del></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>phone has to be responsible for 
sending</em></ins></span>
-    the <span class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data that their transmission is a
-      substantial expense for users.  Said transmission, not wanted or
-      requested by</strong></del></span>
+  &lt;li id="M201812060"&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what</em></ins></span> the <span class="removed"><del><strong>user, 
clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android</em></ins></span> phone <span 
class="inserted"><ins><em>was observed to track location even while
-    in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them</em></ins></span> all <span 
class="inserted"><ins><em>later&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;An Android phone was observed</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>track location even while
+    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on</strong></del></span> <span class="inserted"><ins><em>location data 
while in
+    airplane mode.  Instead, &lt;a
+    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
+    it saved up the data,</em></ins></span> and <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
-    the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    even when &ldquo;location services&rdquo; are turned</em></ins></span> 
off, <span class="removed"><del><strong>listen to</strong></del></span> <span 
class="inserted"><ins><em>even when</em></ins></span>
+    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in 
Android</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable</em></ins></span> phones <span 
class="removed"><del><strong>(and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that</strong></del></span> <span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example of nonfree software pretending to obey the user,
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
+    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
+    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+    unthinkable with free software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
     that users can't delete&lt;/a&gt;, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;
+    of some
+      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201403120"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
     Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports 
that</em></ins></span> &lt;a
+    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The 
Wall</em></ins></span> Street
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
     and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
@@ -986,138 +972,89 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
+      remote command and users cannot stop them:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
-      the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
+    &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
-      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
+    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other 
people's</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola</em></ins></span> phone
-      <span 
class="removed"><del><strong>numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
 
-&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data 
in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give 
Verizon</strong></del></span> <span class="inserted"><ins><em>users that 
install</em></ins></span> the <span class="removed"><del><strong>same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; of users is not enough to
-    legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="removed"><del><strong>Google normally gets 
when</strong></del></span> <span class="inserted"><ins><em>spell out 
what</em></ins></span>
-    they <span class="removed"><del><strong>use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>are &ldquo;consenting&rdquo; to.  Google should 
clearly</em></ins></span> and
-    <span class="inserted"><ins><em>honestly identify</em></ins></span> the
-    <span class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-    &lt;p&gt;However, to truly protect people's privacy, we</em></ins></span> 
must <span class="removed"><del><strong>explicitly opt-in before the app takes 
effect. However,</strong></del></span> <span class="inserted"><ins><em>prevent 
Google
-    and other companies from getting this personal information 
in</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="inserted"><ins><em>not 
enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
+    reading</em></ins></span> the <span class="removed"><del><strong>use of 
data on</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>collects on users, instead of
+    hiding</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other</strong></del></span> 
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201111170"&gt;
+    &lt;p&gt;Some manufacturers add a &lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books</em></ins></span> can <span 
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal data in the 
device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201410080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries, &lt;a
-    
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of data <span class="inserted"><ins><em>to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on</strong></del></span> <span 
class="inserted"><ins><em>user reads at</em></ins></span> what <span 
class="removed"><del><strong>users post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -1134,25 +1071,19 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you to share the picture you take 
according</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>illustrates that making unauthorized copies of 
nonfree software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+    &lt;p&gt;The fact</em></ins></span> that <span 
class="inserted"><ins><em>this is used for repression of forbidden sharing
+    makes</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
+        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span class="removed"><del><strong>its phones. The 
app will give Verizon</strong></del></span> <span 
class="inserted"><ins><em>nonfree software
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying for</em></ins></span> the <span class="inserted"><ins><em>nasty 
thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1164,326 +1095,323 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track</em></ins></span>
-    users' <span class="removed"><del><strong>pictures are private
-      anymore,</strong></del></span> <span 
class="inserted"><ins><em>movements</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>says &lt;a
+    users' <span class="removed"><del><strong>searches that Google normally 
gets</strong></del></span> <span class="inserted"><ins><em>movements 
even</em></ins></span> when
+   <span class="removed"><del><strong>they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> the <span 
class="inserted"><ins><em>user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware (DRM and snooping). 
In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the</strong></del></span> <span 
class="inserted"><ins><em>secretly a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping</strong></del></span>
+  &lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app is <span 
class="inserted"><ins><em>secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too,</em></ins></span> as <span 
class="inserted"><ins><em>you must expect from nonfree
-    programs.&lt;/p&gt;
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;, and the
+    user</strong></del></span> <span class="inserted"><ins><em>users, too, as 
you</em></ins></span> must <span class="removed"><del><strong>explicitly opt-in 
before the app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>expect from nonfree
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> proprietary <span 
class="removed"><del><strong>apps for mobile devices report which other
-    apps</strong></del></span> <span class="inserted"><ins><em>phone 
app&lt;/a&gt; to be allowed into</em></ins></span>
-    the <span class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>event.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;This app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>at least is visible</strong></del></span> <span 
class="inserted"><ins><em>can snoop on a lot of
-    sensitive data, including user's location</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>proprietary phone 
app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This app is a spyware that</em></ins></span> can <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>many sorts of data in</strong></del></span> <span 
class="inserted"><ins><em>a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on 
the user&lt;/a&gt;. This</strong></del></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily</em></ins></span> be <span 
class="removed"><del><strong>distracted by</strong></del></span>
-    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
 
-      &lt;p&gt;The FTC criticized this app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>women's 
rights</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>equal employment
-    and freedom</em></ins></span> to <span class="removed"><del><strong>the 
app developer but did not
-      ask about sending it to other companies.  This shows the
-      weakness of the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>make their own pregnancy choices. Don't use
-    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>do so.</em></ins></span> A <span 
class="removed"><del><strong>free software flashlight</strong></del></span>
-    <span class="inserted"><ins><em>free-software</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
+    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>surveillance is inadequate 
as</strong></del></span> <span class="inserted"><ins><em>women's rights to 
equal employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
+        surveillance.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span> <span 
class="inserted"><ins><em>reward to do so. A
+    free-software</em></ins></span> app <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> that <span 
class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>does more or less 
the same thing without
+    spying</em></ins></span> on <span class="removed"><del><strong>various 
sites 
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>you is available from &lt;a
+    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>Twitter.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>that does more 
or less the same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;li&gt;&lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    a</em></ins></span> new <span class="removed"><del><strong>Magic Photo 
app</strong></del></span> <span class="inserted"><ins><em>one is being 
developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Goggle apps, and sometimes</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data</em></ins></span> for <span 
class="removed"><del><strong>known faces&lt;/a&gt;,
+      and suggests you to share</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>who
+      is in</strong></del></span> <span class="inserted"><ins><em>be 
responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>location data</em></ins></span> to <span 
class="removed"><del><strong>require online</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have</em></ins></span> access to <span 
class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>data, or pass it 
on to user-installed apps that have access</em></ins></span> to <span 
class="removed"><del><strong>be
+      sent across</strong></del></span>
+    the <span class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access</em></ins></span> to 
<span class="removed"><del><strong>Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and the NSA takes advantage</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
-      Here's information</strong></del></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>data. This results in 
massive
+    surveillance on which</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>realize that</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can 
use</em></ins></span> it
+    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
+    medical condition.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have access 
to</em></ins></span>
-    the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried in
+    lengthy terms of service</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a 
way</strong></del></span> <span class="inserted"><ins><em>are 
difficult</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>a typical example of
+      the attitude of the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to</em></ins></span> the 
<span class="removed"><del><strong>toys with a mobile 
phone.</strong></del></span> <span 
class="inserted"><ins><em>data.</em></ins></span> This <span 
class="removed"><del><strong>would
-      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>results</em></ins></span> in <span 
class="inserted"><ins><em>massive
-    surveillance</em></ins></span> on <span class="removed"><del><strong>a 
child's speech, and even speak
-      into</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;</em></ins></span>
-    &lt;p&gt;A <span class="removed"><del><strong>computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>24 &ldquo;health&rdquo; apps found</em></ins></span> 
that <span class="removed"><del><strong>made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>19</em></ins></span> of <span 
class="inserted"><ins><em>them &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive</em></ins></span> personal <span 
class="removed"><del><strong>information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>apps</strong></del></span>
+    <span class="inserted"><ins><em>library</em></ins></span> for <span 
class="inserted"><ins><em>building</em></ins></span> mobile <span 
class="removed"><del><strong>devices report</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> which <span 
class="removed"><del><strong>other
+    apps the user has
+    installed.</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
+    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement that it was anonymizing 
the</strong></del></span> data <span class="removed"><del><strong>may be
-      true, but</strong></del></span> <span class="inserted"><ins><em>to third 
parties&lt;/a&gt;, which can use</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
-    medical condition.&lt;/p&gt;
-
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>had sold the data</strong></del></span> 
<span class="inserted"><ins><em>is buried in
-    lengthy terms of service that are difficult</em></ins></span> to <span 
class="inserted"><ins><em>understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="inserted"><ins><em>convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>to Facebook&lt;/a&gt;. Lots of companies built apps 
that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="inserted"><ins><em>personal</em></ins></span>
-    data <span class="removed"><del><strong>broker</strong></del></span> <span 
class="inserted"><ins><em>they collected</em></ins></span> would <span 
class="removed"><del><strong>have been able to figure out
-      who the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not even the
-    developers</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android</em></ins></span> apps <span class="removed"><del><strong>snoop 
on</strong></del></span> <span class="inserted"><ins><em>use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>perhaps by 
the OS in the
+      phone.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
+      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+    18,000 (23%</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> the <span 
class="removed"><del><strong>app developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+      &lt;p&gt;The FTC criticized</strong></del></span> <span 
class="inserted"><ins><em>total) link</em></ins></span> this <span 
class="removed"><del><strong>app because it asked the user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>ID</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
+    that</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware</em></ins></span> 
in <span class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>companies, and</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    recording all</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>spy through it 
too&lt;/a&gt;.
+      Here's information</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>Google Play had one or</em></ins></span> more 
<span class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span> <span class="inserted"><ins><em>malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users, and 
redirecting
-    them to phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
+    pushing unwanted and often malicious ads on users, and redirecting
+    them</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,
+      a speech recognition company based in</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
+      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>user interface of most of them was 
designed</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
-    there</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span> 
really
-<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+    haven't yet, but they should also stay away from nonfree 
apps</em></ins></span> in <span 
class="removed"><del><strong>on</strong></del></span>
+    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry</em></ins></span> a <span class="removed"><del><strong>child's 
speech, and even speak
+      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
+    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator
+      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    &lt;p&gt;The app was reporting the temperature</strong></del></span>
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>users. 
Other technical flaws were
-    found as well.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements 
about</strong></del></span> <span class="inserted"><ins><em>150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect</em></ins></span> their <span 
class="removed"><del><strong>products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>users’ 
privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive 
advertising&mdash;that</em></ins></span> could <span 
class="removed"><del><strong>have
+      checked and changed.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;The company</strong></del></span>
+    <span class="inserted"><ins><em>potentially also be used to spy on users. 
Other technical flaws were
+    found as well.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span>
+    &lt;p&gt;Moreover, a previous investigation had found</em></ins></span> 
that <span class="removed"><del><strong>made the vibrator</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>personal 
information</strong></del></span>
     <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    &lt;p&gt;It is unfortunate that these articles talk</em></ins></span> 
about <span class="removed"><del><strong>how
+       people used it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free
     apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
+  &lt;li id="M201901050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will do
-    with the data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
-    the company gets that data at all.&lt;/p&gt;
+    stored users' locations to the</em></ins></span> company's <span 
class="removed"><del><strong>statement</strong></del></span> <span 
class="inserted"><ins><em>server&lt;/a&gt;. The company is
+    being sued, demanding</em></ins></span> that it <span 
class="removed"><del><strong>was anonymizing</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>data may be
+      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>had sold</strong></del></span> <span 
class="inserted"><ins><em>will do
+    with</em></ins></span> the <span class="removed"><del><strong>data 
to</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a
+      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>side issue. What</em></ins></span> the <span 
class="removed"><del><strong>data broker would have been able to figure out
+      who</strong></del></span> <span class="inserted"><ins><em>company does
+    with</em></ins></span> the <span class="removed"><del><strong>user 
was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>data is a secondary issue. The principal wrong 
here is that</em></ins></span>
+    the company <span class="removed"><del><strong>has been ordered to pay a 
total</strong></del></span> <span class="inserted"><ins><em>gets that data at 
all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
@@ -1492,9 +1420,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook can correlate the data it obtains from the same machine via
@@ -1503,33 +1431,42 @@
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>phones of users 
that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected</strong></del></span> <span class="inserted"><ins><em>other 
kinds of location
+    tracking, but most users will be tricked</em></ins></span> by the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>save
     a recording. But I can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
@@ -1537,11 +1474,23 @@
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear:</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
@@ -2008,9 +1957,9 @@
   &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear:</em></ins></span> left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
@@ -2250,50 +2199,80 @@
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product 
as shipped doesn't act as</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote changes to the 
code could surely convert it
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
     recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on</em></ins></span> its <span 
class="removed"><del><strong>own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
+    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure to place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>statements 
about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but</em></ins></span> it <span class="removed"><del><strong>through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data 
to a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
@@ -3303,7 +3282,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/21 17:00:27 $
+$Date: 2019/07/30 08:29:18 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- proprietary-surveillance.it.po      21 Jul 2019 17:00:28 -0000      1.315
+++ proprietary-surveillance.it.po      30 Jul 2019 08:29:18 -0000      1.316
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1547,19 +1547,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -1958,6 +1945,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android phones come with a huge number of <a href=\"https://elpais.com/";
 "elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
 "apps that have access to sensitive data without users' knowledge</a>. These "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary-surveillance.ja-diff.html       27 Jul 2019 16:58:47 -0000      
1.170
+++ proprietary-surveillance.ja-diff.html       30 Jul 2019 08:29:18 -0000      
1.171
@@ -824,55 +824,45 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
-      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to 
turn</strong></del></span>
+  &lt;li&gt;&lt;p&gt;According</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
-    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data <span 
class="inserted"><ins><em>to Google.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
-    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
-    what</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track</em></ins></span> location 
<span class="inserted"><ins><em>even while
-    in airplane mode. It didn't send the location data while in
+    &lt;p&gt;An Android phone was observed</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>track location even while
+    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on</strong></del></span> <span class="inserted"><ins><em>location data 
while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up the data,</em></ins></span> and <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned</em></ins></span> 
off, <span class="removed"><del><strong>listen to</strong></del></span> <span 
class="inserted"><ins><em>even when</em></ins></span>
+    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
     disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
@@ -978,44 +968,35 @@
 
         &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
         for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps that include</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span>
+    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take 
according</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed</em></ins></span> to <span class="removed"><del><strong>who
-      is</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
 
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database,</strong></del></span> <span 
class="inserted"><ins><em>Kindle: &lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even</em></ins></span> which <span 
class="removed"><del><strong>means</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page the user reads at</em></ins></span> what <span 
class="removed"><del><strong>radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -1032,16 +1013,20 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="removed"><del><strong>be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share the picture you take 
according</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
+    makes it even more vicious.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across</strong></del></span> <span 
class="inserted"><ins><em>illustrates that making unauthorized copies of 
nonfree software
     is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
       algorithms.&lt;/p&gt;
 
@@ -1083,17 +1068,16 @@
   &lt;li id="M201905060"&gt;
     &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span>
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span> <span class="inserted"><ins><em>run a 
proprietary phone app&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
+    requirement</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
 
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>be allowed into</em></ins></span>
-    the <span class="removed"><del><strong>&lt;a
+      &lt;p&gt;This article shows the &lt;a
 
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;
+      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone app&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>be allowed into
+    the event.&lt;/p&gt;
 
     &lt;p&gt;This app</em></ins></span> is a <span 
class="removed"><del><strong>typical example of
       the attitude</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop on a lot</em></ins></span> of
@@ -1108,64 +1092,75 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>the user 
has
-    installed.</strong></del></span> <span class="inserted"><ins><em>is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 is <span class="removed"><del><strong>doing this in a way that at 
least</strong></del></span> <span class="inserted"><ins><em>often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
     available to employers and insurance companies&lt;/a&gt;. Even though the
-    data</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span> <span class="inserted"><ins><em>&ldquo;anonymized and 
aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
+    data</em></ins></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;anonymized</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>aggregated,&rdquo; 
it can easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>women's rights 
to equal employment
     and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>reward to do so. A
-    free-software app</em></ins></span> that <span 
class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>does more or less the same thing without
-    spying on you</em></ins></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
-    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. 
This</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    a new one</em></ins></span> is <span class="removed"><del><strong>in 
addition to
+      the snooping done by</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>movements of Android phones</em></ins></span> and 
<span class="removed"><del><strong>perhaps by</strong></del></span> <span 
class="inserted"><ins><em>iPhones
+    running Goggle apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree</em></ins></span> apps <span 
class="removed"><del><strong>snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>that have 
access</em></ins></span> to <span class="inserted"><ins><em>sensitive data 
without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>snooping done 
by</strong></del></span> <span class="inserted"><ins><em>data, or pass it on to 
user-installed apps that have access to</em></ins></span>
-    the <span class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>network but no direct 
access to</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>data. This results</em></ins></span> in <span 
class="inserted"><ins><em>massive
-    surveillance on which</em></ins></span> the
+    &lt;p&gt;Nonfree software</em></ins></span> in the
       <span class="removed"><del><strong>phone.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
-      users to say &ldquo;I agree&rdquo;. That is</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>control.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>phone has to</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>responsible for 
sending</em></ins></span>
+    the <span class="removed"><del><strong>app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
-      &lt;p&gt;The FTC criticized this app because it asked the user to
-      approve sending</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the</em></ins></span> data, <span class="removed"><del><strong>including 
geolocation, for use by companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>or pass</em></ins></span> it <span 
class="removed"><del><strong>asked the user</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps 
that have access</em></ins></span> to
+    the <span class="removed"><del><strong>app developer</strong></del></span> 
<span class="inserted"><ins><em>network</em></ins></span> but <span 
class="removed"><del><strong>did not
+      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>no direct access</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>the data.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>results in massive
+    surveillance on which</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive</em></ins></span> personal data to <span 
class="removed"><del><strong>the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can 
use</em></ins></span> it <span class="removed"><del><strong>to other companies. 
 This shows the
-      weakness</strong></del></span>
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app</strong></del></span> <span class="inserted"><ins><em>24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;</em></ins></span>
+    send <span class="inserted"><ins><em>sensitive personal data to third 
parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
-      app send</strong></del></span> <span 
class="inserted"><ins><em>understand. In</em></ins></span> any <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>case,
+    lengthy terms of service that are difficult to understand. 
In</em></ins></span> any <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>case,
     &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
       app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -1237,14 +1232,14 @@
 
       &lt;p&gt;The app reports the temperature</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by
-      <span class="removed"><del><strong>minute (thus, indirectly, whether 
it</strong></del></span> <span class="inserted"><ins><em>resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>surrounded by a person's
+    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it is surrounded</strong></del></span> 
<span class="inserted"><ins><em>total) link this ID to hardware 
identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>a person's
       body), and the vibration frequency.&lt;/p&gt;
 
-      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in 
apparent violation of
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
     that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
@@ -1496,24 +1491,25 @@
     though.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Proprietary software</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Proprietary software in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will 
benefit</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less</em></ins></span> about <span 
class="removed"><del><strong>drivers' movements&lt;/a&gt;,
+      which</strong></del></span> <span class="inserted"><ins><em>sports, you 
will benefit in
+    many ways. This</em></ins></span> is <span 
class="removed"><del><strong>made available</strong></del></span> <span 
class="inserted"><ins><em>one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect</em></ins></span> information about <span 
class="removed"><del><strong>drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span> <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
-    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
-      really a matter of</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies,</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40%</em></ins></span> of <span class="removed"><del><strong>toll-collection 
systems, mentioned in this article, is not
+      really a matter</strong></del></span> <span 
class="inserted"><ins><em>the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods</em></ins></span> of <span 
class="inserted"><ins><em>snooping, in these</em></ins></span> proprietary 
<span class="removed"><del><strong>surveillance. These systems are an
       intolerable invasion of privacy, and should be replaced with anonymous
       payment systems, but the invasion isn't done by 
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
     source code they cannot look at.</em></ins></span>  The other
@@ -1581,10 +1577,10 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
+&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a <span class="removed"><del><strong>joke: The 
other day</strong></del></span> <span class="inserted"><ins><em>user's 
movements around</em></ins></span> a <span class="removed"><del><strong>woman 
came up</strong></del></span> <span class="inserted"><ins><em>physical store by 
noticing WiFi
+    follow</em></ins></span> a <span class="removed"><del><strong>woman came 
up</strong></del></span> <span class="inserted"><ins><em>user's movements 
around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1613,180 +1609,101 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on</strong></del></span> <span class="inserted"><ins><em>hand, Google 
redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice 
of</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was</strong></del></span> <span 
class="inserted"><ins><em>being
-    nonfree. It also distributes its own nonfree apps, such</em></ins></span> 
as <span class="inserted"><ins><em>Google Play,
+  &lt;li&gt;&lt;p&gt;More</strong></del></span> <span 
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>preventing apps from
-    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
-    to <span class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally inadequate.
-      And</strong></del></span> <span class="inserted"><ins><em>inspect 
executable proprietary apps to see</em></ins></span> what <span 
class="removed"><del><strong>happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>they 
do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps, and study
-    the source code somehow</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs</strong></del></span> <span 
class="inserted"><ins><em>app developers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>clever
-    enough</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could 
more</em></ins></span> or less <span class="removed"><del><strong>all 
&ldquo;smart&rdquo; TVs</strong></del></span>
+    <span class="inserted"><ins><em>prevent such snooping, except when the app 
developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
+  &lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop on users&lt;/a&gt;.&lt;/p&gt;
+    snoop</em></ins></span> on <span 
class="removed"><del><strong>their</strong></del></span> 
users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> <span 
class="inserted"><ins><em>they
-    don't snoop.&lt;/p&gt;
+    <span class="removed"><del><strong>&lt;p&gt;The 
report</strong></del></span>
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>track you 
-      across devices.&lt;/p&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;With free software apps, users 
could &lt;em&gt;make sure&lt;/em&gt; that they
+    don't snoop.&lt;/p&gt;
  
-      &lt;p&gt;It is possible to turn this off, but having it enabled by 
default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being 
watched</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users</em></ins></span> 
by
-      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
-      social media participation, Tivo can now</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
-    to
-      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>ultrasound 
from beacons placed in stores or played</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and</strong></del></span> TV <span 
class="removed"><del><strong>advertisements play inaudible 
sounds</strong></del></span>
-    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>do lots 
of surveillance, judging</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other devices in
-      range so as to determine that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access</em></ins></span> it <span 
class="removed"><del><strong>isn't a TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span> <span 
class="inserted"><ins><em>demands to personal data in</em></ins></span> the 
<span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
-    the <span class="removed"><del><strong>internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save it and</strong></del></span> 
<span class="inserted"><ins><em>app</em></ins></span> would <span 
class="removed"><del><strong>then have to
-      give it to</strong></del></span> <span 
class="inserted"><ins><em>record</em></ins></span> the <span 
class="removed"><del><strong>US or some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>names of the audio files users 
listen</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
-    by free software in your own computer.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span>
-    <span class="inserted"><ins><em>along with</em></ins></span> the <span 
class="removed"><del><strong>switch to turn this off has no effect.  (The 
fact</strong></del></span> <span class="inserted"><ins><em>headphone's unique 
serial number.&lt;/p&gt;
-
-    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="inserted"><ins><em>this was done without</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
-    If</em></ins></span> the <span class="removed"><del><strong>server
-      could save</strong></del></span> <span class="inserted"><ins><em>fine 
print of the app said</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>users gave consent for this,
-    would that make</em></ins></span> it <span 
class="inserted"><ins><em>acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design</em></ins></span>
-    the <span class="removed"><del><strong>user's local 
network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>stop this, but any product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for &lt;a
+    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
     &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens</em></ins></span> of <span 
class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to transmit users' personal data to servers. &lt;a
+    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
+  &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install</em></ins></span>
-    on <span class="removed"><del><strong>what programs people watch, and even 
what</strong></del></span> <span class="inserted"><ins><em>some of its phones. 
The app will give Verizon the same information
-    about the users' searches that Google normally gets when</em></ins></span> 
they <span class="removed"><del><strong>wanted to record.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtPlay --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>use
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
+    about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>their users</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>report to</strong></del></span> the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>user must
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>still spyware.&lt;/p&gt;</em></ins></span>
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user</em></ins></span> data <span class="removed"><del><strong>about their 
users</strong></del></span> <span class="inserted"><ins><em>to a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201701210"&gt;
+    &lt;p&gt;The Meitu photo-editing app &lt;a
+    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before</em></ins></span> and <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>after the ride&lt;/a&gt;.&lt;/p&gt;
+    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
@@ -2522,44 +2439,69 @@
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in that country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
+    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  &lt;li id="M201804140"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
+    offers</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV manufacturers in spying</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that 
snoops</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>its user by
     sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>products are 
designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone</em></ins></span> in <span 
class="removed"><del><strong>detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;
+    a device</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> can <span 
class="removed"><del><strong>track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
+    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all users to
+      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
+      range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2575,8 +2517,10 @@
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of what they do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="inserted"><ins><em>companies
+    monitor every aspect of what</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2585,16 +2529,18 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  &lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
     to report its location to someone else and to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
@@ -2609,31 +2555,36 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
-    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
&lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>junkyard the driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
     near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
-    including car location. This feature operates even when the ignition
+    connected to the cellular phone network</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> <span 
class="inserted"><ins><em>sends Ford a lot of data,
+    including car location. This feature operates even when</em></ins></span> 
the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
-    antenna in aluminum foil?&lt;/p&gt;
+    antenna in aluminum foil?&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201811300"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201811300"&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with a terminal that &lt;a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
-    transfers technical data, including car location,
-    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    cars to be equipped with a terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,</em></ins></span>
+    to <span class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>a government-run platform&lt;/a&gt;. In practice, 
&lt;a
     href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to the government-run platform.&lt;/p&gt;
@@ -2645,29 +2596,33 @@
     tracked the choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get</em></ins></span> users' 
-      <span class="removed"><del><strong>friends</strong></del></span> <span 
class="inserted"><ins><em>consent, but it could have got that easily by
-    sneaking it into the contract that users sign for some digital service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="inserted"><ins><em>you,
     watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection 
should</em></ins></span> be <span class="removed"><del><strong>trusted unless 
it</strong></del></span> <span class="inserted"><ins><em>forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the 
software</em></ins></span>
+    is <span class="removed"><del><strong>done
+    by</strong></del></span> free <span class="removed"><del><strong>software 
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't 
collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+    track</em></ins></span> your <span class="removed"><del><strong>own 
computer.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>every 
move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  &lt;li id="M201607160"&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
-    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2675,43 +2630,81 @@
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
+    access its computers remotely</em></ins></span> and
+      <span class="removed"><del><strong>the switch</strong></del></span> 
<span class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to</em></ins></span> do <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>because the system has no authentication
-    when accessed</em></ins></span> through <span 
class="removed"><del><strong>ad networks</strong></del></span> <span 
class="inserted"><ins><em>the modem.  However, even if it asked
-    for authentication, you couldn't be confident</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>Nissan
-    has no access.  The software in the car is proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
+    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>turn this off</strong></del></span> <span 
class="inserted"><ins><em>do because the system</em></ins></span> has no <span 
class="removed"><del><strong>effect.  (The fact that the
+      transmission reports a 404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>authentication
+    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>server
+      could save that data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if</em></ins></span> it
+      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtPlay --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and report</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+    &lt;p&gt;Even if no one connects</em></ins></span> to the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
     enables the phone company to track the car's movements all the time;
-    it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
+    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow</em></ins></span> the <span 
class="inserted"><ins><em>company to extract</em></ins></span>
-    data
-      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>sites made by different 
-      companies.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of</strong></del></span>
 
-      &lt;p&gt;They use</strong></del></span> <span 
class="inserted"><ins><em>determine the car's location
-    at any time. (See Section 2, paragraphs b and c of the &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
+    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says it doesn't 
store</em></ins></span> this <span class="removed"><del><strong>data to 
manipulate people</strong></del></span>
-    <span class="inserted"><ins><em>information, but if the state orders 
it</em></ins></span> to <span class="removed"><del><strong>buy 
things,</strong></del></span> <span class="inserted"><ins><em>get the 
data</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state</em></ins></span> can <span 
class="removed"><del><strong>be led</strong></del></span> <span 
class="inserted"><ins><em>store it.&lt;/p&gt;
+    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+    information, but if the state orders it to get</em></ins></span> the data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201303250"&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
     
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which is made
-    available</em></ins></span> to <span class="removed"><del><strong>spend a 
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers, 
insurance companies, and others.&lt;/p&gt;
+    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
+      companies.&lt;/p&gt;
+
+      &lt;p&gt;They use this data to manipulate people</strong></del></span>
+    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
 
     &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
       also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
@@ -3146,7 +3139,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/27 16:58:47 $
+$Date: 2019/07/30 08:29:18 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary-surveillance.ja.po      27 Jul 2019 16:58:47 -0000      1.296
+++ proprietary-surveillance.ja.po      30 Jul 2019 08:29:18 -0000      1.297
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1149,19 +1149,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -1485,6 +1472,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android phones come with a huge number of <a href=\"https://elpais.com/";
 "elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
 "apps that have access to sensitive data without users' knowledge</a>. These "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary-surveillance.pot        21 Jul 2019 17:00:28 -0000      1.236
+++ proprietary-surveillance.pot        30 Jul 2019 08:29:18 -0000      1.237
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -833,19 +833,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a "
-"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
 "
-"saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a "
 
"href=\"https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent\";>
 "
 "upload call logs automatically from Android phones</a> while disguising what "
@@ -1109,6 +1096,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a "
+"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
 "
+"saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android phones come with a huge number of <a "
 
"href=\"https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\";>
 "
 "preinstalled nonfree apps that have access to sensitive data without users' "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.551
retrieving revision 1.552
diff -u -b -r1.551 -r1.552
--- proprietary-surveillance.ru.po      21 Jul 2019 17:29:00 -0000      1.551
+++ proprietary-surveillance.ru.po      30 Jul 2019 08:29:18 -0000      1.552
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-30 08:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1155,23 +1156,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"Google отслеживает перемещения телефонов на 
базе Android, и иногда <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> хранит эти данные годами</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"За отсылку данных в Google в телефоне должны 
отвечать несвободные программы."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -1575,6 +1559,32 @@
 "разрабатывается новая программа</a>."
 
 #. type: Content of: <ul><li><p>
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# | 
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
+msgstr ""
+"Google отслеживает перемещения телефонов на 
базе Android, и иногда <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> хранит эти данные годами</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+"За отсылку данных в Google в телефоне должны 
отвечать несвободные программы."
+
+#. type: Content of: <ul><li><p>
 msgid ""
 "Many Android phones come with a huge number of <a href=\"https://elpais.com/";
 "elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- pt-br.po    22 Jul 2019 05:58:39 -0000      1.146
+++ pt-br.po    30 Jul 2019 08:29:18 -0000      1.147
@@ -3652,10 +3652,15 @@
 "para proteger a privacidade dos usuários."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 "O Google acompanha os movimentos de telefones Android e, às vezes, <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- ru.po       21 Jul 2019 17:58:41 -0000      1.248
+++ ru.po       30 Jul 2019 08:29:18 -0000      1.249
@@ -4731,10 +4731,19 @@
 "защиты личной жизни пользователей."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# | 
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 "Google отслеживает перемещения телефонов на 
базе Android, и иногда <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
@@ -10621,6 +10630,15 @@
 "процессорах Intel будут встроенные 
несвободные программы-тираны</a>."
 
 #~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google отслеживает перемещения телефонов 
на базе Android, и иногда <a "
+#~ "href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\"> хранит эти данные годами</a>."
+
+#~ msgid ""
 #~ "It should be illegal to have such a device in your apartment without "
 #~ "getting signed consent from the people that live in the other appartments "
 #~ "in the building."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- zh-tw.po    21 Jul 2019 17:00:30 -0000      1.114
+++ zh-tw.po    30 Jul 2019 08:29:18 -0000      1.115
@@ -3305,9 +3305,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]