www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sat, 3 Aug 2019 07:31:26 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/08/03 07:31:26

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.459&r2=1.460
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.316&r2=1.317
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.297&r2=1.298
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.553&r2=1.554
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.116&r2=1.117

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- de.po       30 Jul 2019 08:29:17 -0000      1.116
+++ de.po       3 Aug 2019 11:31:14 -0000       1.117
@@ -7902,6 +7902,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- es.po       30 Jul 2019 08:29:17 -0000      1.157
+++ es.po       3 Aug 2019 11:31:15 -0000       1.158
@@ -6879,6 +6879,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- fr.po       30 Jul 2019 10:28:14 -0000      1.201
+++ fr.po       3 Aug 2019 11:31:15 -0000       1.202
@@ -6582,6 +6582,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- it.po       30 Jul 2019 08:29:17 -0000      1.116
+++ it.po       3 Aug 2019 11:31:15 -0000       1.117
@@ -7449,6 +7449,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- ja.po       30 Jul 2019 08:29:17 -0000      1.123
+++ ja.po       3 Aug 2019 11:31:16 -0000       1.124
@@ -5691,6 +5691,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-mobiles.de-diff.html        15 Jul 2019 10:02:20 -0000      1.60
+++ malware-mobiles.de-diff.html        3 Aug 2019 11:31:16 -0000       1.61
@@ -480,6 +480,17 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
@@ -1376,7 +1387,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:20 $
+$Date: 2019/08/03 11:31:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- malware-mobiles.de.po       15 Jul 2019 10:02:20 -0000      1.117
+++ malware-mobiles.de.po       3 Aug 2019 11:31:16 -0000       1.118
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -859,6 +859,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- malware-mobiles.es.po       17 Jul 2019 09:53:46 -0000      1.136
+++ malware-mobiles.es.po       3 Aug 2019 11:31:16 -0000       1.137
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -717,6 +718,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- malware-mobiles.fr.po       15 Jul 2019 11:32:42 -0000      1.162
+++ malware-mobiles.fr.po       3 Aug 2019 11:31:16 -0000       1.163
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2019-07-15 13:32+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -715,6 +716,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.it-diff.html        15 Jul 2019 10:02:20 -0000      1.65
+++ malware-mobiles.it-diff.html        3 Aug 2019 11:31:16 -0000       1.66
@@ -530,6 +530,17 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
@@ -1420,7 +1431,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:20 $
+$Date: 2019/08/03 11:31:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- malware-mobiles.it.po       15 Jul 2019 10:02:20 -0000      1.117
+++ malware-mobiles.it.po       3 Aug 2019 11:31:16 -0000       1.118
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -810,6 +810,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- malware-mobiles.ja-diff.html        15 Jul 2019 10:02:20 -0000      1.81
+++ malware-mobiles.ja-diff.html        3 Aug 2019 11:31:16 -0000       1.82
@@ -490,6 +490,17 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
@@ -1262,7 +1273,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:20 $
+$Date: 2019/08/03 11:31:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- malware-mobiles.ja.po       15 Jul 2019 10:02:20 -0000      1.107
+++ malware-mobiles.ja.po       3 Aug 2019 11:31:16 -0000       1.108
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -608,6 +608,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- malware-mobiles.pot 15 Jul 2019 10:02:20 -0000      1.83
+++ malware-mobiles.pot 3 Aug 2019 11:31:16 -0000       1.84
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -487,6 +487,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a "
+"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\";>
 "
+"bypass user's settings</a>, regulations, and privacy-enhancing features of "
+"the operating system, in order to gather as much private data as they "
+"possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a "
 
"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\";>
 "
 "not to allow them access to locations</a>."

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- malware-mobiles.ru.po       15 Jul 2019 11:01:09 -0000      1.196
+++ malware-mobiles.ru.po       3 Aug 2019 11:31:16 -0000       1.197
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -706,6 +707,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- nl.po       2 Aug 2019 11:59:44 -0000       1.117
+++ nl.po       3 Aug 2019 11:31:16 -0000       1.118
@@ -5245,6 +5245,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- pl.po       30 Jul 2019 08:29:18 -0000      1.116
+++ pl.po       3 Aug 2019 11:31:16 -0000       1.117
@@ -4581,6 +4581,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- pot 30 Jul 2019 08:29:18 -0000      1.115
+++ pot 3 Aug 2019 11:31:16 -0000       1.116
@@ -4373,6 +4373,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary-surveillance.de-diff.html       30 Jul 2019 08:29:18 -0000      
1.88
+++ proprietary-surveillance.de-diff.html       3 Aug 2019 11:31:16 -0000       
1.89
@@ -1203,301 +1203,344 @@
   &lt;li&gt;&lt;p&gt;A Motorola phone
       &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
       listens</strong></del></span> <span class="inserted"><ins><em>nonfree 
software. It may avoid
-    paying</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    paying</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many</em></ins></span> Android <span 
class="removed"><del><strong>phones (and Windows? laptops): The Wall
-      Street Journal (in</strong></del></span> <span 
class="inserted"><ins><em>apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves</em></ins></span> an <span 
class="removed"><del><strong>article blocked from us</strong></del></span> 
<span class="inserted"><ins><em>apparently unintentional weakness in Android,
-    exploited intentionally</em></ins></span> by <span 
class="inserted"><ins><em>malicious apps.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is 
secretly</em></ins></span> a <span class="removed"><del><strong>paywall)
-      reports that</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
-    for contraception.&lt;/p&gt;
-
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
-    the <span class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware that</em></ins></span> can <span 
class="removed"><del><strong>remotely activate the GPS</strong></del></span> 
<span class="inserted"><ins><em>snoop on a lot of
-    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>contact 
list,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that
+      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS and microphone in Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is
+      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>users cannot stop them:
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
+      remote command and users cannot stop them:
       &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
       
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
       (The US says it will eventually require all new portable phones
       to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>pregnancy 
monitoring apps</em></ins></span> is <span class="inserted"><ins><em>often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>use 
of</strong></del></span>
-    data <span class="removed"><del><strong>on the user's computer, but it 
does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>can easily be
-    traced back</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="removed"><del><strong>user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose is to 
restrict
+      the use of data on the user's computer, but it does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The moviepass app</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
+    &lt;p&gt;The moviepass app and dis-service spy on users even more than 
users
+      expected. It</strong></del></span>
 
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment</em></ins></span>
-    and <span class="removed"><del><strong>dis-service spy on 
users</strong></del></span> <span class="inserted"><ins><em>freedom to make 
their own pregnancy choices. Don't use
-    these apps,</em></ins></span> even <span class="inserted"><ins><em>if 
someone offers you a reward to do so. A
-    free-software app that does</em></ins></span> more <span 
class="removed"><del><strong>than users
-      expected. It</strong></del></span> <span class="inserted"><ins><em>or 
less the same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
         where they travel before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>after going to a movie&lt;/a&gt;.
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>after going</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
+    of the operating system, in order</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
     &lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>gather as 
much private data as
+    they possibly can.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps can</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah app 
-      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered 
driving</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android</em></ins></span> apps can
+    <span class="removed"><del><strong>&lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;</strong></del></span>
 track <span class="removed"><del><strong>your every move&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones</em></ins></span> 
and <span class="removed"><del><strong>email addresses&lt;/a&gt; in user's 
address
-      book to developer's server.  Note that this article 
misuses</strong></del></span> <span class="inserted"><ins><em>iPhones
-    running Goggle apps, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>words
+  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span>
+    <span class="inserted"><ins><em>users' movements even when the user 
says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note that this article misuses the words
       &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;
+      referring</strong></del></span> <span class="inserted"><ins><em>allow 
them access</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Facebook's</strong></del></span>
 
-    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on what people are listening</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In addition, it 
may</strong></del></span> be <span class="removed"><del><strong>analyzing 
people's conversations</strong></del></span> <span 
class="inserted"><ins><em>responsible for sending
-    the location data</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>listens all the time,</strong></del></span> <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
+    for contraception.&lt;/p&gt;
+
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
+    be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots</strong></del></span>
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="removed"><del><strong>surveillance, judging 
by</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have</em></ins></span> access <span 
class="removed"><del><strong>it demands</strong></del></span> to <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>sensitive</em></ins></span> data <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>device&lt;/a&gt;.
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
                &lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
    &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that</strong></del></span> 
<span class="inserted"><ins><em>data, or pass</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
-        pre-install</strong></del></span> on <span 
class="removed"><del><strong>some of its phones. The app will give Verizon the 
same
-   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+        announced an opt-in</strong></del></span> <span 
class="inserted"><ins><em>run a</em></ins></span> proprietary <span 
class="removed"><del><strong>search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
    they use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>have access to</em></ins></span>
-    the <span class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to the data. This 
results in massive
-    surveillance</em></ins></span> on <span class="removed"><del><strong>only 
one phone&lt;/a&gt;, and</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> the user <span 
class="removed"><del><strong>must explicitly opt-in before the app takes 
effect. However, the
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
+    the <span class="inserted"><ins><em>event.&lt;/p&gt;
+
+    &lt;p&gt;This</em></ins></span> app is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>a spyware that can snoop</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>a lot of
+    sensitive data, including user's location</em></ins></span> and <span 
class="inserted"><ins><em>contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
     app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>has absolutely no control.&lt;/p&gt;</em></ins></span>
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal</em></ins></span> data to <span 
class="removed"><del><strong>a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;A</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which</em></ins></span> can <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in the phone, and in server 
accounts,</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> it <span 
class="removed"><del><strong>can
-  alter them too&lt;/a&gt;.
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and</em></ins></span> pregnancy <span 
class="removed"><del><strong>test controller application not only
+  can</strong></del></span> <span class="inserted"><ins><em>monitoring apps is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span>
+    <span class="inserted"><ins><em>data is 
&ldquo;anonymized</em></ins></span> and <span class="removed"><del><strong>in 
server accounts,</strong></del></span> <span 
class="inserted"><ins><em>aggregated,&rdquo;</em></ins></span> it can
+  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+        movements before and after</strong></del></span> <span 
class="inserted"><ins><em>easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;</strong></del></span>
-    for <span class="removed"><del><strong>surveillance is inadequate as a 
protection</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising or discriminating</em></ins></span> against <span 
class="removed"><del><strong>massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people in poor
-    medical condition.&lt;/p&gt;
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>woman who 
uses</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>surveillance is inadequate 
as</strong></del></span> <span class="inserted"><ins><em>women's rights to 
equal employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
+        surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span> <span 
class="inserted"><ins><em>reward to do so. A
+    free-software</em></ins></span> app <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
       all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>include 
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> that <span 
class="removed"><del><strong>include 
       &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio</strong></del></span>
-    <span class="inserted"><ins><em>way</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
+      Symphony surveillance software snoop</strong></del></span> <span 
class="inserted"><ins><em>does more or less the same thing without
+    spying</em></ins></span> on <span class="removed"><del><strong>what radio 
and TV programs 
       are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such</strong></del></span> <span class="inserted"><ins><em>released 
them, apparently not realizing that all the personal
-    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>Facebook, Google+ and 
Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>you is available from &lt;a
+    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a</em></ins></span> new <span class="removed"><del><strong>Magic Photo 
app</strong></del></span> <span class="inserted"><ins><em>one is being 
developed&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Goggle apps, and sometimes</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is in <span 
class="removed"><del><strong>the frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
-    Google's policies. But it</em></ins></span> seems <span 
class="inserted"><ins><em>that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>take 
action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>wire to 
Facebook's servers and face-recognition
+scans your mobile phone's photo collections</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data</em></ins></span> for <span 
class="removed"><del><strong>known faces&lt;/a&gt;,
+      and suggests you to share</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>who
+      is in</strong></del></span> <span class="inserted"><ins><em>be 
responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>location data</em></ins></span> to <span 
class="removed"><del><strong>require online</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have</em></ins></span> access to <span 
class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>data, or pass it 
on</em></ins></span> to <span class="removed"><del><strong>be
+      sent across the wire</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have 
access</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers and face-recognition
       algorithms.&lt;/p&gt;
 
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures</strong></del></span> 
<span class="inserted"><ins><em>a development platform</em></ins></span> are 
<span class="removed"><del><strong>private
-      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore, even if</strong></del></span>
+    the <span class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>network but no 
direct access</em></ins></span> to the <span 
class="removed"><del><strong>service.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based</strong></del></span> <span class="inserted"><ins><em>data. 
This results in massive
+    surveillance</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>which the 
user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>Google 
Play had one or more malicious functionalities, such as</em></ins></span> &lt;a
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>some
-      are starting</strong></del></span> <span class="inserted"><ins><em>often 
malicious ads on users, and redirecting
-    them</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>phishing sites</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>realize that</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can 
use</em></ins></span> it
+    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
+    medical condition.&lt;/p&gt;
 
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>&lt;a
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the &lt;a
 
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is a typical example</strong></del></span> 
<span class="inserted"><ins><em>user interface</em></ins></span> of
-      <span class="removed"><del><strong>the attitude</strong></del></span> 
<span class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
+      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried in
+    lengthy terms of service</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a 
way</strong></del></span> <span class="inserted"><ins><em>are 
difficult</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>a typical example of
+      the attitude of the proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> <span 
class="inserted"><ins><em>them was designed to make uninstallation
-    difficult.&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
-    &lt;p&gt;Users should of course uninstall these 
dangerous</em></ins></span> apps <span class="removed"><del><strong>for mobile 
devices report which other</strong></del></span> <span 
class="inserted"><ins><em>if they
-    haven't yet, but they should also stay away from nonfree</em></ins></span> 
apps <span class="removed"><del><strong>the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</strong></del></span> in
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry</em></ins></span> a <span class="removed"><del><strong>way that at 
least</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
-    there</em></ins></span> is <span class="removed"><del><strong>visible and
-    optional&lt;/a&gt;. Not as bad as</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing</em></ins></span> what <span 
class="removed"><del><strong>the others</strong></del></span> <span 
class="inserted"><ins><em>they really</em></ins></span> do.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>apps</strong></del></span>
+    <span class="inserted"><ins><em>library</em></ins></span> for <span 
class="inserted"><ins><em>building</em></ins></span> mobile <span 
class="removed"><del><strong>devices report</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> which <span 
class="removed"><del><strong>other
+    apps the user has
+    installed.</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
+    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC 
says</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150</em></ins></span> most <span 
class="removed"><del><strong>mobile</strong></del></span> <span 
class="inserted"><ins><em>popular
-    gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for 
children don't respect privacy:</strong></del></span> <span 
class="inserted"><ins><em>in Google Play found that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android</em></ins></span> apps <span class="removed"><del><strong>snoop on the 
user&lt;/a&gt;. This is in addition to
+      the snooping done by the phone company,</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by the question</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. 
As</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>app 
developers get
+      users</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>other companies, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
+    that</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    their programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them</em></ins></span> was <span 
class="removed"><del><strong>found</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to make <span 
class="inserted"><ins><em>uninstallation
+    difficult.&lt;/p&gt;
+
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often</em></ins></span> used <span 
class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
-    the <span class="removed"><del><strong>user&lt;/a&gt;. 
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN 
apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in 
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that 
these articles talk about &ldquo;free
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
     apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1505,65 +1548,39 @@
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>company's 
server&lt;/a&gt;. The company is
-    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>OS in</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do
-    with</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about a side issue. 
What</em></ins></span> the <span class="removed"><del><strong>question of 
whether</strong></del></span> <span class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>app 
developers get
-      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
secondary issue. The principal wrong here is that
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>user's actions</em></ins></span> to
-      <span class="removed"><del><strong>approve sending 
personal</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="inserted"><ins><em>gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the</em></ins></span> data <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>it obtains from</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
-      ask</strong></del></span> <span class="inserted"><ins><em>same machine 
via
-    various apps. Some of them send Facebook detailed 
information</em></ins></span> about <span class="removed"><del><strong>sending 
it to other companies.  This shows</strong></del></span>
-    the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user's activities in the app; others only say that 
the user is
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless</em></ins></span> of <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>user has</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones</em></ins></span> of <span 
class="inserted"><ins><em>users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
@@ -3525,7 +3542,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/30 08:29:18 $
+$Date: 2019/08/03 11:31:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- proprietary-surveillance.de.po      30 Jul 2019 08:29:18 -0000      1.303
+++ proprietary-surveillance.de.po      3 Aug 2019 11:31:16 -0000       1.304
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1940,6 +1940,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.459
retrieving revision 1.460
diff -u -b -r1.459 -r1.460
--- proprietary-surveillance.fr.po      30 Jul 2019 10:28:14 -0000      1.459
+++ proprietary-surveillance.fr.po      3 Aug 2019 11:31:16 -0000       1.460
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2019-07-30 11:46+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1475,6 +1476,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary-surveillance.it-diff.html       30 Jul 2019 08:29:18 -0000      
1.155
+++ proprietary-surveillance.it-diff.html       3 Aug 2019 11:31:16 -0000       
1.156
@@ -1043,18 +1043,29 @@
   <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
     the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app</strong></del></span>
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    send lots</em></ins></span> of <span class="removed"><del><strong>its 
phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page</em></ins></span> the user <span 
class="removed"><del><strong>must explicitly opt-in before the app takes 
effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -1071,19 +1082,26 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
-
-    &lt;p&gt;The fact</em></ins></span> that <span 
class="inserted"><ins><em>this is used for repression of forbidden sharing
-    makes</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span class="removed"><del><strong>its phones. The 
app will give Verizon</strong></del></span> <span 
class="inserted"><ins><em>nonfree software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
-    paying for</em></ins></span> the <span class="inserted"><ins><em>nasty 
thing, but cannot make it less nasty.&lt;/p&gt;
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
+    often</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>legal threat 
demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is</em></ins></span> not <span class="removed"><del><strong>only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts</strong></del></span> <span class="inserted"><ins><em>a cure 
for the injustice</em></ins></span> of <span class="removed"><del><strong>data 
in</strong></del></span> <span class="inserted"><ins><em>nonfree software. It 
may avoid
+    paying for</em></ins></span> the <span class="removed"><del><strong>phone, 
and in server accounts,</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it 
<span class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1093,240 +1111,205 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track</em></ins></span>
-    users' <span class="removed"><del><strong>searches that Google normally 
gets</strong></del></span> <span class="inserted"><ins><em>movements 
even</em></ins></span> when
-   <span class="removed"><del><strong>they use its search engine.&lt;/p&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span> the <span 
class="inserted"><ins><em>user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
+    of</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;
+        for surveillance is inadequate</strong></del></span> <span 
class="inserted"><ins><em>operating system, in order to 
gather</em></ins></span> as <span class="removed"><del><strong>a 
protection</strong></del></span> <span class="inserted"><ins><em>much private 
data as
+    they possibly can.&lt;/p&gt;
 
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
+    &lt;p&gt;Thus, we can't trust rules</em></ins></span> against <span 
class="removed"><del><strong>massive
+        surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app is <span 
class="inserted"><ins><em>secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
-    for contraception.&lt;/p&gt;
-
-    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;, and the
-    user</strong></del></span> <span class="inserted"><ins><em>users, too, as 
you</em></ins></span> must <span class="removed"><del><strong>explicitly opt-in 
before the app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>proprietary phone 
app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware that</em></ins></span> can <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>many sorts of data in</strong></del></span> <span 
class="inserted"><ins><em>a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily be
-    traced back to</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>surveillance is inadequate 
as</strong></del></span> <span class="inserted"><ins><em>women's rights to 
equal employment
-    and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,
+      and suggests</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
+    for contraception.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span> <span 
class="inserted"><ins><em>reward to do so. A
-    free-software</em></ins></span> app <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It snoops on users, too, as</em></ins></span> you <span 
class="inserted"><ins><em>must expect from nonfree
+    programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> that <span 
class="removed"><del><strong>include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>does more or less 
the same thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>various 
sites 
-      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>you is available from &lt;a
-    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>Twitter.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to <span class="removed"><del><strong>share 
the picture you take according</strong></del></span> <span 
class="inserted"><ins><em>run a proprietary phone 
app&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>who
+      is in</strong></del></span> <span class="inserted"><ins><em>be allowed 
into</em></ins></span>
+    the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;</em></ins></span>
 
-  &lt;li&gt;&lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a</em></ins></span> new <span class="removed"><del><strong>Magic Photo 
app</strong></del></span> <span class="inserted"><ins><em>one is being 
developed&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This <span class="inserted"><ins><em>app is a</em></ins></span> 
spyware <span class="removed"><del><strong>feature seems to require online 
access to some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Goggle apps, and sometimes</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data</em></ins></span> for <span 
class="removed"><del><strong>known faces&lt;/a&gt;,
-      and suggests you to share</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available</em></ins></span> to <span class="inserted"><ins><em>employers 
and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can 
easily</em></ins></span> be
+      <span class="removed"><del><strong>sent across</strong></del></span>
+    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>who
-      is in</strong></del></span> <span class="inserted"><ins><em>be 
responsible for sending</em></ins></span>
-    the <span class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>location data</em></ins></span> to <span 
class="removed"><del><strong>require online</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have</em></ins></span> access to <span 
class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>data, or pass it 
on to user-installed apps that have access</em></ins></span> to <span 
class="removed"><del><strong>be
-      sent across</strong></del></span>
-    the <span class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access</em></ins></span> to 
<span class="removed"><del><strong>Facebook's servers and face-recognition
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
+    and <span class="removed"><del><strong>face-recognition
       algorithms.&lt;/p&gt;
 
       &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>data. This results in 
massive
-    surveillance on which</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
+      anymore,</strong></del></span> <span class="inserted"><ins><em>freedom 
to make their own pregnancy choices. Don't use
+    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
+    free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based</strong></del></span> <span class="inserted"><ins><em>same 
thing without
+    spying</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is 
available from &lt;a
+    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>snooping). In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
       demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>realize that</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can 
use</em></ins></span> it
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
-    medical condition.&lt;/p&gt;
+      are starting to realize that it is nasty.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried in
-    lengthy terms of service</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a 
way</strong></del></span> <span class="inserted"><ins><em>are 
difficult</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
-    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>a typical example of
+      &lt;p&gt;This article shows the</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;</em></ins></span>
+    a <span class="removed"><del><strong>way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>new one</em></ins></span> is <span 
class="removed"><del><strong>a typical example of
       the attitude of the proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>apps</strong></del></span>
-    <span class="inserted"><ins><em>library</em></ins></span> for <span 
class="inserted"><ins><em>building</em></ins></span> mobile <span 
class="removed"><del><strong>devices report</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> which <span 
class="removed"><del><strong>other
-    apps the user has
-    installed.</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
-    <span class="inserted"><ins><em>way</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
-    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
+    apps</strong></del></span>
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible</strong></del></span> 
<span class="inserted"><ins><em>movements of Android phones</em></ins></span> 
and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
       &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>iPhones
+    running Goggle apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is</strong></del></span> 
<span class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android</em></ins></span> apps <span class="removed"><del><strong>snoop 
on</strong></del></span> <span class="inserted"><ins><em>use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>perhaps by 
the OS in the
+    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>addition to
+      the snooping done by</strong></del></span> the phone <span 
class="removed"><del><strong>company, and perhaps by the OS in the
       phone.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> the <span 
class="removed"><del><strong>app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized</strong></del></span> <span 
class="inserted"><ins><em>total) link</em></ins></span> this <span 
class="removed"><del><strong>app because it asked the user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>ID</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+      &lt;p&gt;Don't</strong></del></span> <span class="inserted"><ins><em>has 
to</em></ins></span> be <span class="removed"><del><strong>distracted by the 
question of whether</strong></del></span> <span 
class="inserted"><ins><em>responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the</em></ins></span> data, <span class="removed"><del><strong>including 
geolocation, for use by companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>or pass</em></ins></span> it <span 
class="removed"><del><strong>asked the user</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps 
that have access</em></ins></span> to
+    the <span class="removed"><del><strong>app developer</strong></del></span> 
<span class="inserted"><ins><em>network</em></ins></span> but <span 
class="removed"><del><strong>did not
+      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>no direct access</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>the data.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>results in massive
+    surveillance on which</em></ins></span> the
+      <span class="removed"><del><strong>weakness of the 
reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app</strong></del></span> <span class="inserted"><ins><em>user has 
absolutely no control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;</em></ins></span>
+    send <span class="inserted"><ins><em>sensitive personal data to third 
parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
-    that</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
-      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
-      app would not.&lt;/p&gt;
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. 
In</em></ins></span> any <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>case,
+    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware</em></ins></span> 
in <span class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>GeForce Experience</strong></del></span>
+    <span class="inserted"><ins><em>library for building mobile apps, which 
also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
+  &lt;li&gt;&lt;p&gt;Angry Birds
       &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
+      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
+    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>personal
+    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      Here's</strong></del></span> <span class="inserted"><ins><em>Facebook as 
well.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>companies, and</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>spy through it 
too&lt;/a&gt;.
-      Here's information</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>Google Play had one or</em></ins></span> more 
<span class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives</em></ins></span> information on 
&lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
       More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1340,78 +1323,117 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span> <span class="inserted"><ins><em>malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,
-      a speech recognition company based in</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use</em></ins></span> and <span 
class="removed"><del><strong>i-Que</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%)</em></ins></span> 
transmit 
+      <span class="removed"><del><strong>&lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>user interface of most of them was 
designed</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
-    difficult.&lt;/p&gt;
-
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree 
apps</em></ins></span> in <span 
class="removed"><del><strong>on</strong></del></span>
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry</em></ins></span> a <span class="removed"><del><strong>child's 
speech, and even speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
-    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+      can remotely control</strong></del></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>listen in on a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
+      into the toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
        was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
     
     &lt;p&gt;The app was reporting the temperature</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by
+      <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>surrounded by a person's
       body), as well as the vibration frequency.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements 
about</strong></del></span> <span class="inserted"><ins><em>150 most popular
-    gratis VPN apps in Google Play found that &lt;a
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in no 
hurry to take action. This proves
+    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users could</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps</em></ins></span> have
+      <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company that made the vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued</strong></del></span> <span class="inserted"><ins><em>a 
surveillance feature</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>data may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>a
+      data broker, the data broker would have been able</strong></del></span>
+    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them</em></ins></span> to <span class="removed"><del><strong>figure out
+      who</strong></del></span> <span class="inserted"><ins><em>phishing sites 
that stole their credentials. Furthermore,</em></ins></span>
+    the user <span class="removed"><del><strong>was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>interface of most of them was 
designed</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
+    difficult.&lt;/p&gt;
+
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
+    there is no easy way</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
 <span class="inserted"><ins><em>150 most popular
+    gratis VPN apps in Google Play</em></ins></span> found <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect</em></ins></span> their <span 
class="removed"><del><strong>products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>users’ 
privacy&lt;/a&gt; due to DNS leaks. In
+    25% fail</em></ins></span> to <span class="removed"><del><strong>access 
the data&lt;/a&gt;
+      collected by the manufacturer's</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; due to DNS 
leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive 
advertising&mdash;that</em></ins></span> could <span 
class="removed"><del><strong>have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span>
-    <span class="inserted"><ins><em>potentially also be used to spy on users. 
Other technical flaws were
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found</em></ins></span> 
that <span class="removed"><del><strong>made the vibrator</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>personal 
information</strong></del></span>
-    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that these articles talk</em></ins></span> 
about <span class="removed"><del><strong>how
-       people used it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
     apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201901050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Weather Channel app &lt;a
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the</em></ins></span> company's <span 
class="removed"><del><strong>statement</strong></del></span> <span 
class="inserted"><ins><em>server&lt;/a&gt;. The company is
-    being sued, demanding</em></ins></span> that it <span 
class="removed"><del><strong>was anonymizing</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>had sold</strong></del></span> <span 
class="inserted"><ins><em>will do
-    with</em></ins></span> the <span class="removed"><del><strong>data 
to</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a
-      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>side issue. What</em></ins></span> the <span 
class="removed"><del><strong>data broker would have been able to figure out
-      who</strong></del></span> <span class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>user 
was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>data is a secondary issue. The principal wrong 
here is that</em></ins></span>
-    the company <span class="removed"><del><strong>has been ordered to pay a 
total</strong></del></span> <span class="inserted"><ins><em>gets that data at 
all.&lt;/p&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
@@ -1420,9 +1442,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps &lt;a
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook can correlate the data it obtains from the same machine via
@@ -1431,42 +1453,33 @@
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    account.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>phones of users 
that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected</strong></del></span> <span class="inserted"><ins><em>other 
kinds of location
-    tracking, but most users will be tricked</em></ins></span> by the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>save
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
     a recording. But I can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
@@ -1474,23 +1487,11 @@
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
-    and <span class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear:</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
@@ -1754,8 +1755,10 @@
     &lt;p&gt;The article takes for granted that the usual analytics tools are
     legitimate, but is that valid? Software developers have no right to
     analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other snooping.&lt;/p&gt;
-  &lt;/li&gt;
+    that snoop are just as wrong as any other</em></ins></span> 
snooping.&lt;/p&gt;
+
+    <span class="removed"><del><strong>&lt;p&gt;That</strong></del></span>
+  <span class="inserted"><ins><em>&lt;/li&gt;
 
   &lt;li id="M201510300"&gt;
     &lt;p&gt;More than 73% and 47% of mobile applications, from Android and iOS
@@ -1957,9 +1960,9 @@
   &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear:</em></ins></span> left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
@@ -2126,16 +2129,19 @@
   &lt;li id="M201405200"&gt;
     &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>user watches,</em></ins></span> and the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it &lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
-    product could spy this way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="inserted"><ins><em>stop this, but any
+    product could</em></ins></span> spy <span class="inserted"><ins><em>this 
way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
@@ -2145,18 +2151,24 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found a way to break security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
+    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-&lt;ul class="blurbs"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
     
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
@@ -3282,7 +3294,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/30 08:29:18 $
+$Date: 2019/08/03 11:31:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.316
retrieving revision 1.317
diff -u -b -r1.316 -r1.317
--- proprietary-surveillance.it.po      30 Jul 2019 08:29:18 -0000      1.316
+++ proprietary-surveillance.it.po      3 Aug 2019 11:31:17 -0000       1.317
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1883,6 +1883,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- proprietary-surveillance.ja-diff.html       30 Jul 2019 08:29:18 -0000      
1.171
+++ proprietary-surveillance.ja-diff.html       3 Aug 2019 11:31:17 -0000       
1.172
@@ -1025,13 +1025,10 @@
     makes it even more vicious.&lt;/p&gt;</em></ins></span>
 
     &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>illustrates that making unauthorized copies of 
nonfree software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>illustrates that making unauthorized copies of 
nonfree software
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
+      sent across</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1041,10 +1038,24 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
+    of <span class="removed"><del><strong>Facebook users' pictures 
are</strong></del></span> <span class="inserted"><ins><em>the operating system, 
in order to gather as much</em></ins></span> private
+      <span class="removed"><del><strong>anymore,</strong></del></span> <span 
class="inserted"><ins><em>data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track</em></ins></span>
-    users' <span class="removed"><del><strong>pictures are private
-      anymore,</strong></del></span> <span 
class="inserted"><ins><em>movements</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>says &lt;a
+    &lt;p&gt;Many Android apps can track
+    users' movements</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
 
@@ -1068,84 +1079,86 @@
   &lt;li id="M201905060"&gt;
     &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span>
+      demanded users submit</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
+    requirement</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span> <span class="inserted"><ins><em>run a 
proprietary phone app&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>realize that it is 
nasty.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be 
allowed into
+    the event.&lt;/p&gt;</em></ins></span>
 
-      &lt;p&gt;This article shows the &lt;a
+    &lt;p&gt;This <span class="removed"><del><strong>article shows the &lt;a
 
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone app&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>be allowed into
-    the event.&lt;/p&gt;
-
-    &lt;p&gt;This app</em></ins></span> is a <span 
class="removed"><del><strong>typical example of
-      the attitude</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop on a lot</em></ins></span> of
-    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> is a <span 
class="removed"><del><strong>typical example of
+      the attitude</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop on a lot</em></ins></span> of 
<span class="removed"><del><strong>the proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+    apps the user</strong></del></span>
+    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and</em></ins></span> has
+    <span class="removed"><del><strong>installed.</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>the user 
has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 is <span class="removed"><del><strong>doing this in a way that at 
least</strong></del></span> <span class="inserted"><ins><em>often &lt;a
+    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on 
the user&lt;/a&gt;. This</strong></del></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even though the
-    data</em></ins></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;anonymized</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>aggregated,&rdquo; 
it can easily be
-    traced back to</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
-  &lt;/li&gt;
+    available</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
+      &lt;p&gt;Don't</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily</em></ins></span> be <span 
class="removed"><del><strong>distracted by</strong></del></span>
+    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>app developers get
+      users</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>women's rights 
to equal employment
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span class="inserted"><ins><em>equal 
employment
     and freedom to make their own pregnancy choices. Don't use
     these apps, even if someone offers you a reward to do so. A
     free-software app that does more or less the same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on the user&lt;/a&gt;. 
This</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one</em></ins></span> is <span class="removed"><del><strong>in 
addition to
-      the snooping done by</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>movements of Android phones</em></ins></span> and 
<span class="removed"><del><strong>perhaps by</strong></del></span> <span 
class="inserted"><ins><em>iPhones
-    running Goggle apps, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software</em></ins></span> in the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>phone has to</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>responsible for 
sending</em></ins></span>
-    the <span class="removed"><del><strong>app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
+    spying on you</em></ins></span> is <span class="removed"><del><strong>no 
excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Goggle apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to
+      <span class="removed"><del><strong>approve</strong></del></span> <span 
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span 
class="removed"><del><strong>personal</strong></del></span>
+    <span class="inserted"><ins><em>the location</em></ins></span> data to 
<span class="removed"><del><strong>the app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the</em></ins></span> data, <span class="removed"><del><strong>including 
geolocation, for use by companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>or pass</em></ins></span> it <span 
class="removed"><del><strong>asked the user</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps 
that have access</em></ins></span> to
-    the <span class="removed"><del><strong>app developer</strong></del></span> 
<span class="inserted"><ins><em>network</em></ins></span> but <span 
class="removed"><del><strong>did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>no direct access</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>the data.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>results in massive
+    the data, or pass</em></ins></span> it <span 
class="inserted"><ins><em>on</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have access to
+    the network but no direct access to the data.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>results in massive
     surveillance on which</em></ins></span> the
       <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
@@ -1232,14 +1245,14 @@
 
       &lt;p&gt;The app reports the temperature</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it is surrounded</strong></del></span> 
<span class="inserted"><ins><em>total) link this ID to hardware 
identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>a person's
-      body), and the vibration frequency.&lt;/p&gt;
+    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by
+      <span class="removed"><del><strong>minute (thus, indirectly, whether 
it</strong></del></span> <span class="inserted"><ins><em>resetting it.&lt;/p&gt;
 
-      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>resetting it.&lt;/p&gt;
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>surrounded by a person's
+      body), and the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in 
apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
     that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
@@ -1294,23 +1307,23 @@
     haven't yet, but they should also stay away from nonfree apps in
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
     there</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span> 
really
-<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+<span class="removed"><del><strong>clean since &lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span> <span class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>its own malware&lt;/a&gt;.
+    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>their
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>protect their 
users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1327,8 +1340,8 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>Parliament
+      &lt;p&gt;Specifically, it can collect the emails</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>members of Parliament
   this way, because</strong></del></span>
     <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
 
@@ -1403,31 +1416,36 @@
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="inserted"><ins><em>WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>WeatherBug, are
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only the
+      Kindle:</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>report even which page</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;</em></ins></span>
+    report <span class="removed"><del><strong>even which 
page</strong></del></span> <span class="inserted"><ins><em>on</em></ins></span> 
the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
-    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>user's 
actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
       by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of</strong></del></span> data <span 
class="removed"><del><strong>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed to check DRM!&lt;/p&gt;
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them</em></ins></span> send <span 
class="removed"><del><strong>lots</strong></del></span> <span 
class="inserted"><ins><em>Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless</em></ins></span> of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>whether the user has a Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
@@ -1435,54 +1453,45 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
   effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in</strong></del></span> 
<span class="inserted"><ins><em>it obtains from the same machine 
via</em></ins></span>
-    various
-  <span class="removed"><del><strong>settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because</strong></del></span> <span 
class="inserted"><ins><em>apps. Some of them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>user's activities in</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>app; others only say</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
-    access.  The software in</strong></del></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is
-    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+  anyone</strong></del></span>
 
-    &lt;p&gt;Even if no one connects to</strong></del></span>
-    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
-
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>user has a Facebook
-    account.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track</em></ins></span> the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>phones 
of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>user's location 
even when users disable &ldquo;location
+    &lt;p&gt;That's easy to do because</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>system has 
no authentication</strong></del></span> <span class="inserted"><ins><em>user's 
location even</em></ins></span> when
+    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
+    tracking, but most users will</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>tricked by</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
+    modem enables the phone company to track</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
@@ -1492,26 +1501,26 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less</em></ins></span> about <span 
class="removed"><del><strong>drivers' movements&lt;/a&gt;,
-      which</strong></del></span> <span class="inserted"><ins><em>sports, you 
will benefit in
-    many ways. This</em></ins></span> is <span 
class="removed"><del><strong>made available</strong></del></span> <span 
class="inserted"><ins><em>one more.&lt;/p&gt;
+      &lt;p&gt;The case of toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>care much less 
about sports, you will benefit</em></ins></span> in <span 
class="removed"><del><strong>this article,</strong></del></span>
+    <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span 
class="removed"><del><strong>not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies,</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
-    and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40%</em></ins></span> of <span class="removed"><del><strong>toll-collection 
systems, mentioned in this article, is not
-      really a matter</strong></del></span> <span 
class="inserted"><ins><em>the apps were
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of <span class="removed"><del><strong>privacy, and should be replaced with 
anonymous
+      payment systems, but</strong></del></span> the <span 
class="removed"><del><strong>invasion isn't done</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied</em></ins></span> by <span 
class="removed"><del><strong>malware.</strong></del></span> <span 
class="inserted"><ins><em>researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
     found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods</em></ins></span> of <span 
class="inserted"><ins><em>snooping, in these</em></ins></span> proprietary 
<span class="removed"><del><strong>surveillance. These systems are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by 
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
+    detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.</em></ins></span>  The other
       <span class="removed"><del><strong>cases mentioned are done by 
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps 
might be snooping</em></ins></span>
     in <span class="removed"><del><strong>the car.&lt;/p&gt;&lt;/li&gt;
@@ -1560,27 +1569,28 @@
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service</em></ins></span>
-    spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. It &lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
+    spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span>
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+  &lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
+&lt;p&gt;Emo Phillips made</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a <span class="removed"><del><strong>woman came 
up</strong></del></span> <span class="inserted"><ins><em>user's movements 
around a physical store by noticing WiFi
+    follow</em></ins></span> a <span class="removed"><del><strong>joke: The 
other day</strong></del></span> <span class="inserted"><ins><em>user's 
movements around</em></ins></span> a <span class="removed"><del><strong>woman 
came up</strong></del></span> <span class="inserted"><ins><em>physical store by 
noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3139,7 +3149,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/30 08:29:18 $
+$Date: 2019/08/03 11:31:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -b -r1.297 -r1.298
--- proprietary-surveillance.ja.po      30 Jul 2019 08:29:18 -0000      1.297
+++ proprietary-surveillance.ja.po      3 Aug 2019 11:31:17 -0000       1.298
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1410,6 +1410,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary-surveillance.pot        30 Jul 2019 08:29:18 -0000      1.237
+++ proprietary-surveillance.pot        3 Aug 2019 11:31:18 -0000       1.238
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1036,6 +1036,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a "
+"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\";>
 "
+"bypass user's settings</a>, regulations, and privacy-enhancing features of "
+"the operating system, in order to gather as much private data as they "
+"possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a "
 
"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\";>
 "
 "not to allow them access to locations</a>."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.553
retrieving revision 1.554
diff -u -b -r1.553 -r1.554
--- proprietary-surveillance.ru.po      30 Jul 2019 10:30:36 -0000      1.553
+++ proprietary-surveillance.ru.po      3 Aug 2019 11:31:18 -0000       1.554
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1461,6 +1462,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.de-diff.html    21 Jul 2019 17:00:28 -0000      1.109
+++ proprietary.de-diff.html    3 Aug 2019 11:31:18 -0000       1.110
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -186,6 +186,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
@@ -241,19 +252,6 @@
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809210"&gt;
-    &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
-    developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
-    made very addictive&lt;/a&gt; for a large proportion of its users&mdash;and
-    turned into a cash machine for themselves&mdash;by using &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    psychological manipulation techniques&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article uses &ldquo;free&rdquo; to mean &ldquo;zero
-    price,&rdquo; which is a usage we should avoid. We recommend saying
-    &ldquo;gratis&rdquo; instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -314,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/21 17:00:28 $
+$Date: 2019/08/03 11:31:18 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary.de.po   21 Jul 2019 17:00:28 -0000      1.151
+++ proprietary.de.po   3 Aug 2019 11:31:20 -0000       1.152
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -439,6 +439,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -512,22 +527,6 @@
 "intentionally by malicious apps."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary.es.po   22 Jul 2019 10:17:49 -0000      1.190
+++ proprietary.es.po   3 Aug 2019 11:31:20 -0000       1.191
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -303,6 +304,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -410,30 +426,6 @@
 "Al parecer se trata de un defecto no intencionado de Android, aprovechado "
 "intencionalmente por aplicaciones maliciosas."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-"Cash of Clans es un buen ejemplo de juego gratuito para móviles que sus "
-"desarrolladores <a href=\"https://gamerant.com/clash-of-clans-addiction/";
-"\">hicieron muy adictivo</a> para un gran número de usuarios 
(convirtiéndolo "
-"en una caja registradora para ellos), empleando <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\">técnicas de manipulación "
-"psicológica</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-"El artículo utiliza el término <cite>«free»</cite> para significar 
«precio "
-"cero», algo que debemos evitar. Recomendamos en su lugar decir: «gratis»."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,6 +505,30 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Cash of Clans is a good example of a gratis mobile game that its "
+#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\";> "
+#~ "made very addictive</a> for a large proportion of its users&mdash;and "
+#~ "turned into a cash machine for themselves&mdash;by using <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\"> psychological "
+#~ "manipulation techniques</a>."
+#~ msgstr ""
+#~ "Cash of Clans es un buen ejemplo de juego gratuito para móviles que sus "
+#~ "desarrolladores <a href=\"https://gamerant.com/clash-of-clans-addiction/";
+#~ "\">hicieron muy adictivo</a> para un gran número de usuarios "
+#~ "(convirtiéndolo en una caja registradora para ellos), empleando <a href="
+#~ "\"/proprietary/proprietary-addictions.html#addictiveness\">técnicas de "
+#~ "manipulación psicológica</a>."
+
+#~ msgid ""
+#~ "The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; "
+#~ "which is a usage we should avoid. We recommend saying &ldquo;"
+#~ "gratis&rdquo; instead."
+#~ msgstr ""
+#~ "El artículo utiliza el término <cite>«free»</cite> para significar "
+#~ "«precio cero», algo que debemos evitar. Recomendamos en su lugar decir: "
+#~ "«gratis»."
+
+#~ msgid ""
 #~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
 #~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
 #~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- proprietary.fr.po   21 Jul 2019 17:33:20 -0000      1.232
+++ proprietary.fr.po   3 Aug 2019 11:31:21 -0000       1.233
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2019-07-21 19:12+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -299,6 +300,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -408,31 +424,6 @@
 "Cela fait intervenir une faille apparemment involontaire d'Android, qui est "
 "exploitée sciemment par les applis malveillantes."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-"Cash of Clans est un bon exemple de jeu gratuit sur mobile que ses "
-"développeurs <a href=\"https://gamerant.com/clash-of-clans-addiction/\";>ont "
-"rendu très addictif</a> pour une grande proportion des joueurs (et qu'ils "
-"ont transformé en machine à cash pour eux-mêmes) en utilisant des <a 
href=\"/"
-"proprietary/proprietary-addictions.html#addictiveness\">techniques de "
-"manipulation psychologique</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-"Malheureusement, cet article utilise le mot <cite>free</cite> dans le sens "
-"de « gratuit », ce qui est à éviter. Nous recommandons de le remplacer 
par "
-"<cite>gratis</cite>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,3 +497,27 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Cash of Clans is a good example of a gratis mobile game that its "
+#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\";> "
+#~ "made very addictive</a> for a large proportion of its users&mdash;and "
+#~ "turned into a cash machine for themselves&mdash;by using <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\"> psychological "
+#~ "manipulation techniques</a>."
+#~ msgstr ""
+#~ "Cash of Clans est un bon exemple de jeu gratuit sur mobile que ses "
+#~ "développeurs <a href=\"https://gamerant.com/clash-of-clans-addiction/";
+#~ "\">ont rendu très addictif</a> pour une grande proportion des joueurs (et 
"
+#~ "qu'ils ont transformé en machine à cash pour eux-mêmes) en utilisant 
des "
+#~ "<a href=\"/proprietary/proprietary-addictions.html#addictiveness"
+#~ "\">techniques de manipulation psychologique</a>."
+
+#~ msgid ""
+#~ "The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; "
+#~ "which is a usage we should avoid. We recommend saying &ldquo;"
+#~ "gratis&rdquo; instead."
+#~ msgstr ""
+#~ "Malheureusement, cet article utilise le mot <cite>free</cite> dans le "
+#~ "sens de « gratuit », ce qui est à éviter. Nous recommandons de le "
+#~ "remplacer par <cite>gratis</cite>."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary.it-diff.html    21 Jul 2019 17:00:28 -0000      1.121
+++ proprietary.it-diff.html    3 Aug 2019 11:31:21 -0000       1.122
@@ -185,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
@@ -240,19 +251,6 @@
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809210"&gt;
-    &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
-    developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
-    made very addictive&lt;/a&gt; for a large proportion of its users&mdash;and
-    turned into a cash machine for themselves&mdash;by using &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    psychological manipulation techniques&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article uses &ldquo;free&rdquo; to mean &ldquo;zero
-    price,&rdquo; which is a usage we should avoid. We recommend saying
-    &ldquo;gratis&rdquo; instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -313,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/21 17:00:28 $
+$Date: 2019/08/03 11:31:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary.it.po   21 Jul 2019 17:00:30 -0000      1.160
+++ proprietary.it.po   3 Aug 2019 11:31:21 -0000       1.161
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -516,22 +531,6 @@
 "intentionally by malicious apps."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.ja-diff.html    21 Jul 2019 17:00:30 -0000      1.124
+++ proprietary.ja-diff.html    3 Aug 2019 11:31:21 -0000       1.125
@@ -182,6 +182,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
@@ -237,19 +248,6 @@
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809210"&gt;
-    &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
-    developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
-    made very addictive&lt;/a&gt; for a large proportion of its users&mdash;and
-    turned into a cash machine for themselves&mdash;by using &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    psychological manipulation techniques&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article uses &ldquo;free&rdquo; to mean &ldquo;zero
-    price,&rdquo; which is a usage we should avoid. We recommend saying
-    &ldquo;gratis&rdquo; instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +308,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/21 17:00:30 $
+$Date: 2019/08/03 11:31:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary.ja.po   21 Jul 2019 17:00:30 -0000      1.144
+++ proprietary.ja.po   3 Aug 2019 11:31:21 -0000       1.145
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -307,6 +307,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -380,22 +395,6 @@
 "intentionally by malicious apps."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.nl-diff.html    2 Aug 2019 12:29:43 -0000       1.122
+++ proprietary.nl-diff.html    3 Aug 2019 11:31:21 -0000       1.123
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -185,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
@@ -240,19 +251,6 @@
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809210"&gt;
-    &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
-    developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
-    made very addictive&lt;/a&gt; for a large proportion of its users&mdash;and
-    turned into a cash machine for themselves&mdash;by using &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    psychological manipulation techniques&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article uses &ldquo;free&rdquo; to mean &ldquo;zero
-    price,&rdquo; which is a usage we should avoid. We recommend saying
-    &ldquo;gratis&rdquo; instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -313,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/02 12:29:43 $
+$Date: 2019/08/03 11:31:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary.nl.po   2 Aug 2019 11:59:44 -0000       1.134
+++ proprietary.nl.po   3 Aug 2019 11:31:22 -0000       1.135
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -345,6 +345,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -418,22 +433,6 @@
 "intentionally by malicious apps."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary.pl-diff.html    21 Jul 2019 17:00:30 -0000      1.139
+++ proprietary.pl-diff.html    3 Aug 2019 11:31:23 -0000       1.140
@@ -128,17 +128,17 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -183,6 +183,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
@@ -238,19 +249,6 @@
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809210"&gt;
-    &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
-    developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
-    made very addictive&lt;/a&gt; for a large proportion of its users&mdash;and
-    turned into a cash machine for themselves&mdash;by using &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    psychological manipulation techniques&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article uses &ldquo;free&rdquo; to mean &ldquo;zero
-    price,&rdquo; which is a usage we should avoid. We recommend saying
-    &ldquo;gratis&rdquo; instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -311,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/21 17:00:30 $
+$Date: 2019/08/03 11:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary.pl.po   21 Jul 2019 17:00:30 -0000      1.127
+++ proprietary.pl.po   3 Aug 2019 11:31:23 -0000       1.128
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -592,22 +607,6 @@
 "intentionally by malicious apps."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.pot     21 Jul 2019 17:00:30 -0000      1.124
+++ proprietary.pot     3 Aug 2019 11:31:24 -0000       1.125
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a "
+"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\";>
 "
+"bypass user's settings</a>, regulations, and privacy-enhancing features of "
+"the operating system, in order to gather as much private data as they "
+"possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a "
 
"href=\"https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/\";>even
 "
 "when it is not supposed to listen</a>. Thus, when one of Google's "
@@ -323,23 +338,6 @@
 "intentionally by malicious apps."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a "
-"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
-"psychological manipulation techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; "
-"instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary.pt-br.po        22 Jul 2019 05:58:39 -0000      1.191
+++ proprietary.pt-br.po        3 Aug 2019 11:31:24 -0000       1.192
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2019-07-22 02:20-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -296,6 +297,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -404,30 +420,6 @@
 "Isso evolve uma aparente falha não intencional no Android, explorada "
 "intencionalmente por aplicativos maliciosos."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-"Cash of Clans é um bom exemplo de um jogo grátis para celular cujos "
-"desenvolvedores <a href=\"https://gamerant.com/clash-of-clans-addiction/\";> "
-"tornaram muito viciante</a> para uma grande proporção de seus usuários "
-"&ndash; e o transformaram em um caixa eletrônico para eles mesmos &ndash; "
-"usando <a href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
-"técnicas de manipulação psicológica</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-"O artigo usa “<i lang=\"en\">free</i>” no sentido de “preço zero”, 
uso este "
-"que nós devemos evitar. Recomendamos dizer “grátis”."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -503,6 +495,29 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "Cash of Clans is a good example of a gratis mobile game that its "
+#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\";> "
+#~ "made very addictive</a> for a large proportion of its users&mdash;and "
+#~ "turned into a cash machine for themselves&mdash;by using <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\"> psychological "
+#~ "manipulation techniques</a>."
+#~ msgstr ""
+#~ "Cash of Clans é um bom exemplo de um jogo grátis para celular cujos "
+#~ "desenvolvedores <a href=\"https://gamerant.com/clash-of-clans-addiction/";
+#~ "\"> tornaram muito viciante</a> para uma grande proporção de seus "
+#~ "usuários &ndash; e o transformaram em um caixa eletrônico para eles "
+#~ "mesmos &ndash; usando <a href=\"/proprietary/proprietary-addictions."
+#~ "html#addictiveness\"> técnicas de manipulação psicológica</a>."
+
+#~ msgid ""
+#~ "The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; "
+#~ "which is a usage we should avoid. We recommend saying &ldquo;"
+#~ "gratis&rdquo; instead."
+#~ msgstr ""
+#~ "O artigo usa “<i lang=\"en\">free</i>” no sentido de “preço 
zero”, uso "
+#~ "este que nós devemos evitar. Recomendamos dizer “grátis”."
+
+#~ msgid ""
 #~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
 #~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
 #~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- proprietary.ru.po   21 Jul 2019 17:29:00 -0000      1.268
+++ proprietary.ru.po   3 Aug 2019 11:31:24 -0000       1.269
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -412,30 +428,6 @@
 "Это связано с очевидно непреднамеренной 
слабостью в Android, преднамеренно "
 "используемой вредоносными приложениями."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-"Cash of Clans&nbsp;&mdash; хороший пример бесплатной 
мобильной игры, которую "
-"ее разработчики сделали <a 
href=\"https://gamerant.com/clash-of-clans-";
-"addiction/\"> вызывающей сильную зависимость</a> 
у большой доли "
-"пользователей&nbsp;&mdash; и превратили в 
автомат, производящий деньги для "
-"разработчиков, с помощью <a 
href=\"/proprietary/proprietary-addictions."
-"html#addictiveness\"> приемов психологической 
манипуляции</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-"В статье слово &ldquo;свободный&rdquo; 
используется в смысле нулевой цены. "
-"Мы рекомендуем вместо этого говорить 
&ldquo;бесплатный&rdquo;."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -515,6 +507,29 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Cash of Clans is a good example of a gratis mobile game that its "
+#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\";> "
+#~ "made very addictive</a> for a large proportion of its users&mdash;and "
+#~ "turned into a cash machine for themselves&mdash;by using <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\"> psychological "
+#~ "manipulation techniques</a>."
+#~ msgstr ""
+#~ "Cash of Clans&nbsp;&mdash; хороший пример 
бесплатной мобильной игры, "
+#~ "которую ее разработчики сделали <a 
href=\"https://gamerant.com/clash-of-";
+#~ "clans-addiction/\"> вызывающей сильную 
зависимость</a> у большой доли "
+#~ "пользователей&nbsp;&mdash; и превратили в 
автомат, производящий деньги "
+#~ "для разработчиков, с помощью <a 
href=\"/proprietary/proprietary-"
+#~ "addictions.html#addictiveness\"> приемов псих
ологической манипуляции</a>."
+
+#~ msgid ""
+#~ "The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; "
+#~ "which is a usage we should avoid. We recommend saying &ldquo;"
+#~ "gratis&rdquo; instead."
+#~ msgstr ""
+#~ "В статье слово &ldquo;свободный&rdquo; 
используется в смысле нулевой "
+#~ "цены. Мы рекомендуем вместо этого 
говорить &ldquo;бесплатный&rdquo;."
+
+#~ msgid ""
 #~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
 #~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
 #~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-";

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.zh-tw-diff.html 1 Aug 2019 08:28:32 -0000       1.100
+++ proprietary.zh-tw-diff.html 3 Aug 2019 11:31:25 -0000       1.101
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -186,6 +186,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
@@ -241,19 +252,6 @@
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809210"&gt;
-    &lt;p&gt;Cash of Clans is a good example of a gratis mobile game that its
-    developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
-    made very addictive&lt;/a&gt; for a large proportion of its users&mdash;and
-    turned into a cash machine for themselves&mdash;by using &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    psychological manipulation techniques&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article uses &ldquo;free&rdquo; to mean &ldquo;zero
-    price,&rdquo; which is a usage we should avoid. We recommend saying
-    &ldquo;gratis&rdquo; instead.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -314,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/01 08:28:32 $
+$Date: 2019/08/03 11:31:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary.zh-tw.po        1 Aug 2019 07:58:32 -0000       1.111
+++ proprietary.zh-tw.po        3 Aug 2019 11:31:25 -0000       1.112
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -417,6 +417,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -490,22 +505,6 @@
 "intentionally by malicious apps."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\";> made very "
-"addictive</a> for a large proportion of its users&mdash;and turned into a "
-"cash machine for themselves&mdash;by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses &ldquo;free&rdquo; to mean &ldquo;zero price,&rdquo; which "
-"is a usage we should avoid. We recommend saying &ldquo;gratis&rdquo; instead."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- pt-br.po    1 Aug 2019 20:59:11 -0000       1.149
+++ pt-br.po    3 Aug 2019 11:31:25 -0000       1.150
@@ -5072,6 +5072,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- ru.po       30 Jul 2019 10:59:31 -0000      1.251
+++ ru.po       3 Aug 2019 11:31:25 -0000       1.252
@@ -6535,6 +6535,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- zh-tw.po    1 Aug 2019 08:28:32 -0000       1.116
+++ zh-tw.po    3 Aug 2019 11:31:25 -0000       1.117
@@ -4582,6 +4582,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying.  What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/";
 "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
 "\"> requirement to run a proprietary phone app</a> to be allowed into the "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]