www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Tue, 6 Aug 2019 04:29:31 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/08/06 04:29:31

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.117&r2=1.118

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- de.po       3 Aug 2019 11:31:14 -0000       1.117
+++ de.po       6 Aug 2019 08:29:29 -0000       1.118
@@ -7569,6 +7569,21 @@
 msgstr "Unsicherheit in Smartphones"
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | Siri, Alexa, and all the other voice-control systems can be <a
 # | 
href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\";>{+
 # | +}hijacked by programs that play commands in ultrasound that humans can't

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- es.po       4 Aug 2019 14:58:46 -0000       1.159
+++ es.po       6 Aug 2019 08:29:29 -0000       1.160
@@ -6558,6 +6558,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses &ldquo;free&rdquo;-]
+# | {+refers+} to [-mean &ldquo;zero price.&rdquo; We recommend saying-]
+# | {+these proprietary apps as &ldquo;free&rdquo;. It should have said+}
+# | &ldquo;gratis&rdquo; instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+"Desafortunadamente, el artículo utiliza el término <cite>«free»</cite> 
para "
+"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- fr.po       3 Aug 2019 13:59:26 -0000       1.203
+++ fr.po       6 Aug 2019 08:29:29 -0000       1.204
@@ -6282,6 +6282,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- it.po       3 Aug 2019 11:31:15 -0000       1.117
+++ it.po       6 Aug 2019 08:29:29 -0000       1.118
@@ -7137,6 +7137,21 @@
 msgstr "Scarsa sicurezza in dispositivi mobili"
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | Siri, Alexa, and all the other voice-control systems can be <a
 # | 
href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\";>{+
 # | +}hijacked by programs that play commands in ultrasound that humans can't

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- ja.po       3 Aug 2019 11:31:16 -0000       1.124
+++ ja.po       6 Aug 2019 08:29:29 -0000       1.125
@@ -5458,6 +5458,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-mobiles.de-diff.html        3 Aug 2019 11:31:16 -0000       1.61
+++ malware-mobiles.de-diff.html        6 Aug 2019 08:29:29 -0000       1.62
@@ -255,6 +255,19 @@
 &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201807100"&gt;</em></ins></span>
     &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a 
<span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
@@ -337,34 +350,51 @@
     &lt;p&gt;&lt;a
     
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
     WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be 
recovered</em></ins></span>
-    in <span class="removed"><del><strong>user's address
-      book to</strong></del></span> <span class="inserted"><ins><em>various 
ways.&lt;/p&gt;
+    in <span class="inserted"><ins><em>various ways.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201607280"&gt;
     &lt;p&gt;A half-blind security critique of a tracking app: it found that 
&lt;a
     
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
-    blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
-    The critique fails entirely to express concern that the app sends the
-    personal data to a server, where the &lt;em&gt;developer&lt;/em&gt; gets 
it all.
+    blatant flaws allowed anyone to snoop on a</em></ins></span> user's <span 
class="removed"><del><strong>address
+      book</strong></del></span> <span class="inserted"><ins><em>personal 
data&lt;/a&gt;.
+    The critique fails entirely</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note</strong></del></span> 
<span class="inserted"><ins><em>express concern</em></ins></span> that <span 
class="removed"><del><strong>this article misuses</strong></del></span> the 
<span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's</strong></del></span> app <span 
class="removed"><del><strong>listens all</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+  on what people are listening</strong></del></span>
+    <span class="inserted"><ins><em>personal data</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span class="inserted"><ins><em>a server, where 
the &lt;em&gt;developer&lt;/em&gt; gets</em></ins></span> it <span 
class="removed"><del><strong>may
+  be analyzing people's conversations to serve</strong></del></span> <span 
class="inserted"><ins><em>all.
     This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
 
     &lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and surely
-    it is worthless since nearly all of them are.&lt;/p&gt;
+    it is worthless since nearly all of</em></ins></span> them <span 
class="removed"><del><strong>with targeted
+  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>are.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201607190"&gt;
-    &lt;p&gt;A bug in a proprietary ASN.1 library, used
-    in cell phone towers as well as cell phones and routers, &lt;a
-    
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;</em></ins></span>
+    &lt;p&gt;A <span class="inserted"><ins><em>bug in a proprietary ASN.1 
library, used
+    in cell phone towers as well as cell phones and routers,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
     taking control of those systems&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603100"&gt;
     &lt;p&gt;Many proprietary payment apps &lt;a
     
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;transmit
-    personal data in an insecure way&lt;/a&gt;. However,
-    the worse aspect of these apps is that &lt;a
+    personal data in an insecure way&lt;/a&gt;. However,</em></ins></span>
+    the <span class="removed"><del><strong>privacy and 
security</strong></del></span> <span class="inserted"><ins><em>worse 
aspect</em></ins></span> of <span class="removed"><del><strong>283 Android 
VPN</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> apps <span 
class="removed"><del><strong>concluded</strong></del></span> <span 
class="inserted"><ins><em>is</em></ins></span> that <span 
class="removed"><del><strong>&ldquo;in spite of the
+    promises for privacy, security,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not
     anonymous&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -374,9 +404,10 @@
     
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
     Many smartphone apps use insecure authentication methods when storing
     your personal data on remote servers&lt;/a&gt;. This leaves personal
-    information like email addresses, passwords, and health information
-    vulnerable. Because many of these apps are proprietary it makes it
-    hard to impossible to know which apps are at risk.&lt;/p&gt;
+    information like email addresses, passwords,</em></ins></span> and <span 
class="removed"><del><strong>anonymity given by the
+    majority of VPN apps&mdash;millions</strong></del></span> <span 
class="inserted"><ins><em>health information
+    vulnerable. Because many</em></ins></span> of <span 
class="removed"><del><strong>users may be unawarely 
subject</strong></del></span> <span class="inserted"><ins><em>these apps are 
proprietary it makes it
+    hard</em></ins></span> to <span class="removed"><del><strong>poor security 
guarantees and</strong></del></span> <span class="inserted"><ins><em>impossible 
to know which apps are at risk.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405190"&gt;
@@ -742,7 +773,7 @@
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to</em></ins></span> developer's server.  Note that this <span 
class="removed"><del><strong>article misuses</strong></del></span> <span 
class="inserted"><ins><em>article misuses the words
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
@@ -809,24 +840,16 @@
     the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses that this was done without</em></ins></span> the 
<span class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>users' 
consent.
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs</em></ins></span> of <span 
class="inserted"><ins><em>Android apps can collude
-    to transmit users' personal</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>servers. &lt;a
+  &lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -834,15 +857,14 @@
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search</em></ins></span> app <span 
class="removed"><del><strong>listens all</strong></del></span> <span 
class="inserted"><ins><em>that it will&lt;/a&gt; pre-install
-    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>same information
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
-  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and the user must
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
@@ -851,8 +873,7 @@
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>serve 
them with targeted
-  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -862,20 +883,17 @@
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;</em></ins></span>
+    massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;</em></ins></span>
+  &lt;li id="M201611160"&gt;
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
     apps&mdash;millions of users may be unawarely subject to poor security
-    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+    guarantees and</em></ins></span> abusive practices inflicted by VPN 
apps.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Following is a non-exhaustive <span 
class="removed"><del><strong>list</strong></del></span> <span 
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
     of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN 
apps <span class="removed"><del><strong>from
@@ -1387,7 +1405,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/03 11:31:16 $
+$Date: 2019/08/06 08:29:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- malware-mobiles.de.po       3 Aug 2019 11:31:16 -0000       1.118
+++ malware-mobiles.de.po       6 Aug 2019 08:29:29 -0000       1.119
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -452,6 +452,21 @@
 "schwerwiegenden Fehler hat."
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | Siri, Alexa, and all the other voice-control systems can be <a
 # | 
href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\";>{+
 # | +}hijacked by programs that play commands in ultrasound that humans can't

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- malware-mobiles.es.po       4 Aug 2019 14:54:44 -0000       1.138
+++ malware-mobiles.es.po       6 Aug 2019 08:29:29 -0000       1.139
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -362,6 +363,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses &ldquo;free&rdquo;-]
+# | {+refers+} to [-mean &ldquo;zero price.&rdquo; We recommend saying-]
+# | {+these proprietary apps as &ldquo;free&rdquo;. It should have said+}
+# | &ldquo;gratis&rdquo; instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+"Desafortunadamente, el artículo utiliza el término <cite>«free»</cite> 
para "
+"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- malware-mobiles.fr.po       3 Aug 2019 13:59:26 -0000       1.164
+++ malware-mobiles.fr.po       6 Aug 2019 08:29:29 -0000       1.165
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2019-08-03 15:58+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -360,6 +361,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- malware-mobiles.it-diff.html        3 Aug 2019 11:31:16 -0000       1.66
+++ malware-mobiles.it-diff.html        6 Aug 2019 08:29:30 -0000       1.67
@@ -334,6 +334,19 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201807100"&gt;
     &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
@@ -1431,7 +1444,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/03 11:31:16 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- malware-mobiles.it.po       3 Aug 2019 11:31:16 -0000       1.118
+++ malware-mobiles.it.po       6 Aug 2019 08:29:30 -0000       1.119
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -427,6 +427,21 @@
 "software proprietario di prestigio è immune da difetti."
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | Siri, Alexa, and all the other voice-control systems can be <a
 # | 
href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\";>{+
 # | +}hijacked by programs that play commands in ultrasound that humans can't

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- malware-mobiles.ja-diff.html        3 Aug 2019 11:31:16 -0000       1.82
+++ malware-mobiles.ja-diff.html        6 Aug 2019 08:29:30 -0000       1.83
@@ -241,7 +241,7 @@
     use&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor that the local phone
+    universal back</em></ins></span> door <span class="inserted"><ins><em>in 
the modem processor</em></ins></span> that <span 
class="removed"><del><strong>we know nearly</strong></del></span> <span 
class="inserted"><ins><em>the local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -257,9 +257,10 @@
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
-    all models of mobile phones have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
-    universal back</em></ins></span> door <span class="inserted"><ins><em>in 
the modem chip&lt;/a&gt;. So why did Coolpad bother
+    A Chinese version of Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
+    all
+  <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span 
class="removed"><del><strong>have.</strong></del></span> <span 
class="inserted"><ins><em>have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
+    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
     to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -294,6 +295,19 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;.</em></ins></span> It <span 
class="removed"><del><strong>may involve exploiting various bugs. There 
are</strong></del></span> <span class="inserted"><ins><em>should have said 
&ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201807100"&gt;
     &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
@@ -333,7 +347,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201701130"&gt;
-    &lt;p&gt;WhatsApp has a feature</em></ins></span> that <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;WhatsApp has a feature that &lt;a
     
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
     has been described as a &ldquo;back door&rdquo;&lt;/a&gt; because it would
     enable governments to nullify its encryption.&lt;/p&gt;
@@ -764,18 +778,17 @@
 
     &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
     worked in various ways to prevent that, and deleted these apps after
-    discovering what they did. So</em></ins></span> we <span 
class="removed"><del><strong>know nearly all
-  portable phones have.</strong></del></span> <span 
class="inserted"><ins><em>cannot blame Google specifically
+    discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
-    nonfree.</em></ins></span> It <span class="removed"><del><strong>may 
involve exploiting various bugs.</strong></del></span> <span 
class="inserted"><ins><em>also distributes its own nonfree apps, such as Google 
Play,
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating?</em></ins></span> There <span class="inserted"><ins><em>is no 
systematic way for Google, or Android users,
+    cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
@@ -814,7 +827,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users</em></ins></span> are <span class="inserted"><ins><em>suing 
Bose for &lt;a
+    &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
     the app would record the names of the audio files users listen to
@@ -1273,7 +1286,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/03 11:31:16 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- malware-mobiles.ja.po       3 Aug 2019 11:31:16 -0000       1.108
+++ malware-mobiles.ja.po       6 Aug 2019 08:29:30 -0000       1.109
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -333,6 +333,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- malware-mobiles.pot 3 Aug 2019 11:31:16 -0000       1.84
+++ malware-mobiles.pot 6 Aug 2019 08:29:30 -0000       1.85
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -258,6 +258,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a "
+"href=\"https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/\";>
 "
+"failed to detect a test virus</a>. All of them asked for dangerous "
+"permissions or contained advertising trackers, with seven being more risky "
+"than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as "
+"&ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a "
 
"href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\";>
 "
 "hijacked by programs that play commands in ultrasound that humans can't "

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- malware-mobiles.ru.po       5 Aug 2019 07:28:36 -0000       1.198
+++ malware-mobiles.ru.po       6 Aug 2019 08:29:30 -0000       1.199
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -355,6 +356,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses &ldquo;free&rdquo;-]
+# | {+refers+} to [-mean &ldquo;zero price.&rdquo; We recommend saying-]
+# | {+these proprietary apps as &ldquo;free&rdquo;. It should have said+}
+# | &ldquo;gratis&rdquo; instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+"К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в значении "
+"&ldquo;нулевой цены&rdquo;. Мы рекомендуем 
вместо этого говорить &ldquo;"
+"бесплатный&rdquo;."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- nl.po       3 Aug 2019 11:31:16 -0000       1.118
+++ nl.po       6 Aug 2019 08:29:30 -0000       1.119
@@ -5020,6 +5020,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- pl.po       3 Aug 2019 11:31:16 -0000       1.117
+++ pl.po       6 Aug 2019 08:29:30 -0000       1.118
@@ -4386,6 +4386,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- pot 3 Aug 2019 11:31:16 -0000       1.116
+++ pot 6 Aug 2019 08:29:30 -0000       1.117
@@ -4178,6 +4178,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-insecurity.de-diff.html 15 Jul 2019 10:02:22 -0000      1.28
+++ proprietary-insecurity.de-diff.html 6 Aug 2019 08:29:30 -0000       1.29
@@ -63,86 +63,107 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to <span class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
+to <span class="removed"><del><strong>present the specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;
+  &lt;p&gt;Some Samsung phones
+    randomly</strong></del></span> <span class="inserted"><ins><em>serve as 
specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
+    photos</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed</em></ins></span> to <span class="removed"><del><strong>people in 
the owner's contact list&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;One</strong></del></span> <span class="inserted"><ins><em>detect a 
test virus&lt;/a&gt;. All</em></ins></span> of <span 
class="inserted"><ins><em>them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than</em></ins></span> the <span 
class="removed"><del><strong>dangers</strong></del></span> <span 
class="inserted"><ins><em>average</em></ins></span> of the <span 
class="removed"><del><strong>&ldquo;internet of stings&rdquo; is that, if
+    you lose your internet service, you also &lt;a
+href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
+    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;For your safety, don't use any appliance with a connection 
to</strong></del></span> <span class="inserted"><ins><em>100 most popular 
Android apps.&lt;/p&gt;
 
-&lt;ul&gt;
+    &lt;p&gt;Note that</em></ins></span> the <span 
class="removed"><del><strong>real
+    internet.&lt;/p&gt;
+&lt;/li&gt;
 &lt;li&gt;
-  &lt;p&gt;Some Samsung phones
-    randomly</strong></del></span> <span class="inserted"><ins><em>user 
says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos</strong></del></span>
+  &lt;p&gt;Amazon recently invited consumers</strong></del></span> <span 
class="inserted"><ins><em>article refers</em></ins></span> to <span 
class="removed"><del><strong>be suckers and</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to <span 
class="removed"><del><strong>people</strong></del></span> <span 
class="inserted"><ins><em>allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+    not to</em></ins></span> allow <span class="removed"><del><strong>delivery 
staff</strong></del></span> <span class="inserted"><ins><em>them 
access</em></ins></span> to <span class="removed"><del><strong>open their front 
doors&lt;/a&gt;. Wouldn't you know it,
+    the system has a grave security flaw.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Intel's intentional &ldquo;management engine&rdquo; back door has 
&lt;a
+href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/"&gt;
+    unintended back doors&lt;/a&gt; too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>the owner's 
contact list&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android,
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;One of</strong></del></span>
+  &lt;p&gt;Bad security</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught in</em></ins></span> the <span 
class="removed"><del><strong>dangers</strong></del></span> <span 
class="inserted"><ins><em>jail</em></ins></span> of <span 
class="inserted"><ins><em>an iMonster are &lt;a
+    &lt;p&gt;Users caught</em></ins></span> in <span 
class="removed"><del><strong>some cars makes it possible
+    to &lt;a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
+      remotely activate</strong></del></span> the <span 
class="removed"><del><strong>airbags&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump 
designed</strong></del></span> <span class="inserted"><ins><em>jail of an 
iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
-    ducks for other attackers&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;internet</strong></del></span> <span 
class="inserted"><ins><em>app censorship prevents security
+    ducks</em></ins></span> for
+    <span class="removed"><del><strong>hospitals</strong></del></span> <span 
class="inserted"><ins><em>other attackers&lt;/a&gt;, and the app censorship 
prevents security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
-    &lt;p&gt;Apple's censorship</em></ins></span> of <span 
class="removed"><del><strong>stings&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> is <span 
class="removed"><del><strong>that, if
-    you lose your internet service, you also &lt;a
-href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control of your house</strong></del></span> <span 
class="inserted"><ins><em>fundamentally unjust,</em></ins></span> and <span 
class="removed"><del><strong>appliances&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;For your safety, don't use any appliance with a connection to the 
real
-    internet.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;Amazon recently invited consumers to</strong></del></span> <span 
class="inserted"><ins><em>would</em></ins></span> be <span 
class="removed"><del><strong>suckers and &lt;a
-href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff</strong></del></span>
-    <span class="inserted"><ins><em>inexcusable even if it didn't 
lead</em></ins></span> to <span class="removed"><del><strong>open their front 
doors&lt;/a&gt;. Wouldn't you know it,
-    the system has a grave</strong></del></span> security <span 
class="removed"><del><strong>flaw.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>threats as well.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Apple's censorship of apps</em></ins></span> is <span 
class="removed"><del><strong>connected</strong></del></span> <span 
class="inserted"><ins><em>fundamentally unjust, and would be
+    inexcusable even if it didn't lead</em></ins></span> to <span 
class="removed"><del><strong>the internet. Naturally &lt;a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    its</strong></del></span> security <span class="inserted"><ins><em>threats 
as well.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Intel's intentional &ldquo;management engine&rdquo; back 
door</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol</em></ins></span> has 
&lt;a
-<span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/"&gt;
-    unintended back doors&lt;/a&gt; too.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;Bad security</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol</em></ins></span> has 
<span class="removed"><del><strong>been cracked&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities</em></ins></span> that <span 
class="removed"><del><strong>this article misuses</strong></del></span> <span 
class="inserted"><ins><em>affect several models of implantable
+    defibrillators&lt;/a&gt; and</em></ins></span> the <span 
class="removed"><del><strong>term &lt;a
+href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
+     referring</strong></del></span> <span class="inserted"><ins><em>devices 
they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered</em></ins></span> in <span 
class="removed"><del><strong>some cars makes it possible
-    to &lt;a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
-      remotely activate</strong></del></span> <span 
class="inserted"><ins><em>an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by</em></ins></span> the 
<span 
class="removed"><del><strong>airbags&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>company to
-    correct them. This means you can't rely on proprietary software
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the 
company</em></ins></span> to <span 
class="removed"><del><strong>crackers.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>correct them. This means you can't rely on 
proprietary software
     developers to fix bugs in their products.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
-    hospitals</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera</em></ins></span> is <span 
class="removed"><del><strong>connected to</strong></del></span> <span 
class="inserted"><ins><em>designed so that</em></ins></span> the <span 
class="removed"><del><strong>internet. Naturally</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch all 
the time. Now it turns out
-    that</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902270"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>bad security in many 
Internet of Stings devices
+    allows</strong></del></span> <span class="inserted"><ins><em>Ring (now 
Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
     unintentional and I suppose Amazon will fix it. I
-    do not expect Amazon to change the design that &lt;a
+    do not expect Amazon</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>change</em></ins></span> the <span 
class="removed"><del><strong>people</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span> that <span 
class="removed"><del><strong>use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be</strong></del></span> <span class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -155,28 +176,34 @@
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>sucker&mdash;reject all</strong></del></span> 
<span class="inserted"><ins><em>way to break</em></ins></span> the <span 
class="removed"><del><strong>stings.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+    turn it into a listening device&lt;/a&gt; for 
them.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in that country,
+    &lt;p&gt;It <span class="removed"><del><strong>is unfortunate 
that</strong></del></span> <span class="inserted"><ins><em>was very difficult 
for them to do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>article 
uses</strong></del></span> <span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>term</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a
+     <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize"&gt;
+     &ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201807100"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201807100"&gt;</em></ins></span>
     &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201807020"&gt;
+  &lt;li <span class="removed"><del><strong>id="break-security-smarttv"&gt;
+  &lt;p&gt;&lt;a
+       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+      Crackers found</strong></del></span> <span 
class="inserted"><ins><em>id="M201807020"&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
     photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
@@ -188,7 +215,7 @@
     
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
     lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;For your safety, don't use any appliance with a connection to the
+    &lt;p&gt;For your safety, don't use any appliance with</em></ins></span> a 
<span class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>connection</em></ins></span> to <span 
class="removed"><del><strong>break security on</strong></del></span> <span 
class="inserted"><ins><em>the
     real internet.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -202,7 +229,7 @@
     &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
     allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system has a grave security flaw.&lt;/p&gt;
+    it, the system has</em></ins></span> a <span 
class="inserted"><ins><em>grave security flaw.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709290"&gt;
@@ -212,44 +239,29 @@
   &lt;/li&gt;
 
   &lt;li id="M201709200"&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
+    &lt;p&gt;A</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TV&lt;/a&gt; and use</strong></del></span> <span 
class="inserted"><ins><em>intravenous pump
     designed for hospitals is connected to the internet. Naturally &lt;a
     
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;</em></ins></span>
-    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
+    its <span class="removed"><del><strong>camera</strong></del></span> <span 
class="inserted"><ins><em>security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Note that this article misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring to crackers.&lt;/p&gt;
+    referring</em></ins></span> to <span 
class="removed"><del><strong>watch</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;</em></ins></span>
+  &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    to snoop on</em></ins></span> the people <span 
class="removed"><del><strong>who are watching 
TV.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>that use 
them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that the article uses the term &lt;a
-     <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize"&gt;
-     &ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be
-  &lt;a
-href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
-  hijacked by programs that play commands in ultrasound that humans can't
-  hear&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li <span class="removed"><del><strong>id="break-security-smarttv"&gt;
-  &lt;p&gt;&lt;a
-       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-      Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
-      to watch the people who are watching TV.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201706200.1"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li 
id="M201706200.1"&gt;</em></ins></span>
     &lt;p&gt;Many models of Internet-connected cameras &lt;a
     href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
     have backdoors&lt;/a&gt;.&lt;/p&gt;
@@ -1027,7 +1039,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:22 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary-insecurity.de.po        15 Jul 2019 10:02:22 -0000      1.131
+++ proprietary-insecurity.de.po        6 Aug 2019 08:29:30 -0000       1.132
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -139,6 +139,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-insecurity.es.po        18 Jul 2019 12:58:55 -0000      1.2
+++ proprietary-insecurity.es.po        6 Aug 2019 08:29:30 -0000       1.3
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2019-07-18 14:25+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -111,6 +112,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses &ldquo;free&rdquo;-]
+# | {+refers+} to [-mean &ldquo;zero price.&rdquo; We recommend saying-]
+# | {+these proprietary apps as &ldquo;free&rdquo;. It should have said+}
+# | &ldquo;gratis&rdquo; instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+"Desafortunadamente, el artículo utiliza el término <cite>«free»</cite> 
para "
+"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary-insecurity.fr.po        15 Jul 2019 11:32:42 -0000      1.168
+++ proprietary-insecurity.fr.po        6 Aug 2019 08:29:30 -0000       1.169
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2019-07-15 13:32+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -110,6 +111,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary-insecurity.it-diff.html 15 Jul 2019 10:02:22 -0000      1.43
+++ proprietary-insecurity.it-diff.html 6 Aug 2019 08:29:30 -0000       1.44
@@ -58,97 +58,97 @@
 &lt;li id="break-security-smarttv"&gt;
   &lt;p&gt;&lt;a
        
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-      Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
-      to watch the people who are watching TV.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;Many models</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;This page lists clearly established 
cases</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras &lt;a
-  href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
-  have backdoors&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;That is a malicious functionality, but</strong></del></span> <span 
class="inserted"><ins><em>insecurity</em></ins></span> in <span 
class="removed"><del><strong>addition it</strong></del></span>
-<span class="inserted"><ins><em>proprietary software that has grave 
consequences or</em></ins></span> is <span class="removed"><del><strong>a gross
-  insecurity since anyone, including malicious crackers, &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find those accounts and use them to get into
-  users' cameras&lt;/a&gt;.&lt;/p&gt;
-
-&lt;/li&gt;
+      Crackers found</strong></del></span>
 
-&lt;li&gt;
-  &lt;p&gt;
-    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
-    pre-installed on 28 models</strong></del></span> <span 
class="inserted"><ins><em>otherwise
+<span class="inserted"><ins><em>&lt;p&gt;This page lists clearly established 
cases of insecurity in
+proprietary software that has grave consequences or is otherwise
 noteworthy.&lt;/p&gt;
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>HP laptops logged the user's
-    keystroke</strong></del></span> <span class="inserted"><ins><em>an example 
that ought</em></ins></span> to <span class="removed"><del><strong>a 
file</strong></del></span> <span class="inserted"><ins><em>be</em></ins></span> 
in <span class="removed"><del><strong>the filesystem. Any process with 
access</strong></del></span> <span class="inserted"><ins><em>this page but isn't
-here, please write</em></ins></span>
-to <span class="inserted"><ins><em>&lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>filesystem</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference</em></ins></span> or 
<span class="removed"><del><strong>the MapViewOfFile API could gain 
access</strong></del></span> <span 
class="inserted"><ins><em>two</em></ins></span>
-to <span class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include the URL of</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>trustworthy reference or two</em></ins></span>
+to <span class="removed"><del><strong>break</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when</em></ins></span> the
-    <span class="removed"><del><strong>log. Furthermore,</strong></del></span> 
<span class="inserted"><ins><em>user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according</strong></del></span>
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by</em></ins></span> security <span 
class="removed"><del><strong>on a &ldquo;smart&rdquo; TV&lt;/a&gt; and use its 
camera</strong></del></span> <span class="inserted"><ins><em>researchers, eight 
&lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed</em></ins></span> to <span 
class="removed"><del><strong>watch</strong></del></span> <span 
class="inserted"><ins><em>detect a test virus&lt;/a&gt;. All of them asked for 
dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than</em></ins></span> the <span class="removed"><del><strong>people 
who are watching TV.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>average of the 100 most popular Android 
apps.&lt;/p&gt;
+
+    &lt;p&gt;Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;</em></ins></span>
+    &lt;p&gt;Many <span class="removed"><del><strong>models of 
Internet-connected cameras</strong></del></span> <span 
class="inserted"><ins><em>Android apps can track
+    users' movements even when the user says</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
+  have backdoors&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;That is a malicious functionality, but</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to <span 
class="removed"><del><strong>modzero&lt;/a&gt; the &ldquo;information-leak via 
Covert Storage
-    Channel enables malware authors</strong></del></span> <span 
class="inserted"><ins><em>allow them access</em></ins></span> to <span 
class="removed"><del><strong>capture keystrokes without
-    taking</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
+    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>addition it is 
a gross
+  insecurity since anyone, including</strong></del></span> <span 
class="inserted"><ins><em>Android,
+    exploited intentionally by</em></ins></span> malicious <span 
class="removed"><del><strong>crackers,</strong></del></span> <span 
class="inserted"><ins><em>apps.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught in</em></ins></span> the <span 
class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>jail</em></ins></span> of <span 
class="removed"><del><strong>being classified</strong></del></span> <span 
class="inserted"><ins><em>an iMonster are &lt;a
-    href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
+    &lt;p&gt;Users caught in the jail of an iMonster are</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html"&gt;
 sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
-    companies from figuring out how those attacks work.&lt;/p&gt;
+    companies from figuring out how</em></ins></span> those <span 
class="removed"><del><strong>accounts</strong></del></span> <span 
class="inserted"><ins><em>attacks work.&lt;/p&gt;
 
-    &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable even if it didn't lead to security threats</em></ins></span> 
as <span class="removed"><del><strong>malicious task by AV
-    heuristics&rdquo;.
-  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Apple's censorship of apps is fundamentally 
unjust,</em></ins></span> and <span class="removed"><del><strong>use 
them</strong></del></span> <span class="inserted"><ins><em>would be
+    inexcusable even if it didn't lead</em></ins></span> to <span 
class="removed"><del><strong>get into
+  users' cameras&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>security threats as well.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>proprietary 
code</strong></del></span> <span class="inserted"><ins><em>Medtronics Conexus 
Telemetry Protocol has &lt;a
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;
+    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+    pre-installed on 28</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
     
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities</em></ins></span> that <span 
class="removed"><del><strong>runs pacemakers, insulin 
pumps,</strong></del></span> <span class="inserted"><ins><em>affect several 
models of implantable
-    defibrillators&lt;/a&gt;</em></ins></span> and <span 
class="removed"><del><strong>other
-medical</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> devices <span 
class="removed"><del><strong>is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they connect to.&lt;/p&gt;
+    two vulnerabilities that affect several</em></ins></span> models of <span 
class="removed"><del><strong>HP laptops logged</strong></del></span> <span 
class="inserted"><ins><em>implantable
+    defibrillators&lt;/a&gt; and</em></ins></span> the <span 
class="removed"><del><strong>user's
+    keystroke to a file</strong></del></span> <span 
class="inserted"><ins><em>devices they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
     vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the company to
-    correct them. This means you can't rely on proprietary software
-    developers to fix bugs in their products.&lt;/p&gt;</em></ins></span>
+    protocol</em></ins></span> in <span class="inserted"><ins><em>2008. 
Apparently, nothing was done by</em></ins></span> the <span 
class="removed"><del><strong>filesystem. Any process with 
access</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> to
+    <span class="removed"><del><strong>the filesystem or the MapViewOfFile API 
could gain access</strong></del></span>
+    <span class="inserted"><ins><em>correct them. This means you can't rely on 
proprietary software
+    developers</em></ins></span> to <span class="inserted"><ins><em>fix bugs 
in their products.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Exploits</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
-    manufacturer (now Amazon) can watch all the time. Now it turns out
-    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so 
that</em></ins></span> the
+    <span class="removed"><del><strong>log. Furthermore,</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch all 
the time. Now it turns out
+    that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
     unintentional and I suppose Amazon will fix it. I
-    do not expect Amazon to change the design that &lt;a
+    do not expect Amazon</em></ins></span> to <span 
class="removed"><del><strong>modzero&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>change</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;information-leak via Covert Storage
+    Channel enables malware authors</strong></del></span> <span 
class="inserted"><ins><em>design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
-    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+    Amazon</em></ins></span> to <span class="removed"><del><strong>capture 
keystrokes without
+    taking</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201809240"&gt;
@@ -159,13 +159,18 @@
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security</em></ins></span> of 
<span class="removed"><del><strong>bugs</strong></del></span> <span 
class="inserted"><ins><em>an Amazon device,
+    &lt;p&gt;Crackers found a way to break</em></ins></span> the <span 
class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>security</em></ins></span> of <span 
class="removed"><del><strong>being classified</strong></del></span> <span 
class="inserted"><ins><em>an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product</em></ins></span> in 
<span class="removed"><del><strong>Windows, which were 
developed</strong></del></span> <span class="inserted"><ins><em>that country,
+    easier for Amazon. And if some government such</em></ins></span> as <span 
class="removed"><del><strong>malicious task by AV
+    heuristics&rdquo;.
+  &lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;The proprietary code</strong></del></span> <span 
class="inserted"><ins><em>China or the US
+    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>runs pacemakers, insulin 
pumps,</strong></del></span> <span class="inserted"><ins><em>country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;These crackers are probably hackers too, but please &lt;a
@@ -174,23 +179,25 @@
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa,</em></ins></span> and <span 
class="inserted"><ins><em>all the</em></ins></span> other
+<span class="removed"><del><strong>medical devices</strong></del></span> <span 
class="inserted"><ins><em>voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
-    hijacked</em></ins></span> by <span class="inserted"><ins><em>programs 
that play commands in ultrasound that humans
+    hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807020"&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos to people in</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>owner's contact list&lt;/a&gt;.&lt;/p&gt;
+    photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712240"&gt;
-    &lt;p&gt;One of the dangers of the &ldquo;internet of stings&rdquo;
-    is that, if you lose your internet service, you also &lt;a
-    
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;One of the dangers of the &ldquo;internet of 
stings&rdquo;</em></ins></span>
+    is <span class="inserted"><ins><em>that, if you lose your internet 
service, you also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
+    lose control</em></ins></span> of <span 
class="removed"><del><strong>gross</strong></del></span> <span 
class="inserted"><ins><em>your house and appliances&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For your safety, don't use any appliance with a connection to the
     real internet.&lt;/p&gt;
@@ -206,13 +213,17 @@
     &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
     allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system has a grave security flaw.&lt;/p&gt;
+    it, the system has a grave</em></ins></span> security <span 
class="removed"><del><strong>faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>flaw.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201709290"&gt;
-    &lt;p&gt;Bad security in some cars makes it possible to &lt;a
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Exploits of bugs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709290"&gt;
+    &lt;p&gt;Bad security</em></ins></span> in <span 
class="removed"><del><strong>Windows, which were developed 
by</strong></del></span> <span class="inserted"><ins><em>some cars makes it 
possible to &lt;a
     href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
-    remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
+    remotely activate</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>airbags&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709200"&gt;
@@ -987,7 +998,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:22 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary-insecurity.it.po        15 Jul 2019 10:02:22 -0000      1.148
+++ proprietary-insecurity.it.po        6 Aug 2019 08:29:30 -0000       1.149
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -132,6 +132,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary-insecurity.ja-diff.html 15 Jul 2019 10:02:23 -0000      1.62
+++ proprietary-insecurity.ja-diff.html 6 Aug 2019 08:29:30 -0000       1.63
@@ -75,25 +75,37 @@
 here, please write</em></ins></span>
 to <span class="removed"><del><strong>weak security,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
 is easy</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;</em></ins></span>
-to <span class="removed"><del><strong>open</strong></del></span> <span 
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>doors</strong></del></span> <span 
class="inserted"><ins><em>URL</em></ins></span> of <span 
class="removed"><del><strong>100 million cars built by 
Volkswagen&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+to <span class="removed"><del><strong>open</strong></del></span> <span 
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>doors</strong></del></span> <span 
class="inserted"><ins><em>URL</em></ins></span> of <span 
class="removed"><del><strong>100 million cars built</strong></del></span> <span 
class="inserted"><ins><em>a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
-&lt;li&gt;
-&lt;p&gt;Ransomware &lt;a 
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has
-been developed for</strong></del></span> a <span 
class="removed"><del><strong>thermostat that uses proprietary 
software&lt;/a&gt;.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested</em></ins></span> by <span 
class="removed"><del><strong>Volkswagen&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
+&lt;p&gt;Ransomware</strong></del></span> <span 
class="inserted"><ins><em>security researchers, eight</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has
+been developed for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect</em></ins></span> a <span 
class="removed"><del><strong>thermostat</strong></del></span> <span 
class="inserted"><ins><em>test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>uses</strong></del></span> <span 
class="inserted"><ins><em>the article refers to these</em></ins></span> 
proprietary <span 
class="removed"><del><strong>software&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in
-Internet Explorer and Edge&lt;/a&gt; allows an attacker</strong></del></span> 
<span class="inserted"><ins><em>trustworthy reference or two</em></ins></span>
-to <span class="removed"><del><strong>retrieve
-Microsoft account credentials, if</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
-&lt;/div&gt;
-&lt;/div&gt;
-&lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
+Internet Explorer and Edge&lt;/a&gt; allows an attacker to retrieve
+Microsoft account credentials, if</strong></del></span>
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201907080"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when</em></ins></span> the user <span 
class="removed"><del><strong>is tricked into visiting a
 malicious link.&lt;/p&gt;
@@ -115,16 +127,12 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201905150"&gt;
     &lt;p&gt;Users caught</em></ins></span> in <span 
class="removed"><del><strong>Apple's Image I/O API 
allowed</strong></del></span> <span class="inserted"><ins><em>the jail 
of</em></ins></span> an <span class="removed"><del><strong>attacker 
to</strong></del></span> <span class="inserted"><ins><em>iMonster 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-  malacious code</strong></del></span>
+  malacious code from any application which uses</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html"&gt;
 sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
-    companies</em></ins></span> from <span class="removed"><del><strong>any 
application which uses this API to render a
-  certain kind</strong></del></span> <span class="inserted"><ins><em>figuring 
out how those attacks work.&lt;/p&gt;
+    companies from figuring out how those attacks work.&lt;/p&gt;
 
-    &lt;p&gt;Apple's censorship</em></ins></span> of <span 
class="removed"><del><strong>image file&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;A bug in a proprietary ASN.1 library,</strong></del></span> <span 
class="inserted"><ins><em>apps is fundamentally unjust, and would be
+    &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
     inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -413,12 +421,13 @@
   &lt;li id="M201607220"&gt;
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code from any application which uses this API to render a
+    malicious code from any application which uses</em></ins></span> this API 
to render a
     certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201607190"&gt;
-    &lt;p&gt;A bug in a proprietary ASN.1 library,</em></ins></span> used
+  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;</em></ins></span>
+    &lt;p&gt;A bug in a proprietary ASN.1 library, used
     in cell phone towers as well as cell phones and routers, &lt;a
     
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
     taking control of those systems&lt;/a&gt;.&lt;/p&gt;
@@ -933,7 +942,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/07/15 10:02:23 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary-insecurity.ja.po        15 Jul 2019 10:02:23 -0000      1.120
+++ proprietary-insecurity.ja.po        6 Aug 2019 08:29:30 -0000       1.121
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -106,6 +106,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary-insecurity.pot  15 Jul 2019 10:02:23 -0000      1.87
+++ proprietary-insecurity.pot  6 Aug 2019 08:29:30 -0000       1.88
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a "
+"href=\"https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/\";>
 "
+"failed to detect a test virus</a>. All of them asked for dangerous "
+"permissions or contained advertising trackers, with seven being more risky "
+"than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as "
+"&ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a "
 
"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\";>
 "
 "not to allow them access to locations</a>."

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary-insecurity.ru.po        15 Jul 2019 11:01:09 -0000      1.221
+++ proprietary-insecurity.ru.po        6 Aug 2019 08:29:30 -0000       1.222
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2018-12-02 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses &ldquo;free&rdquo;-]
+# | {+refers+} to [-mean &ldquo;zero price.&rdquo; We recommend saying-]
+# | {+these proprietary apps as &ldquo;free&rdquo;. It should have said+}
+# | &ldquo;gratis&rdquo; instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+"К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в значении "
+"&ldquo;нулевой цены&rdquo;. Мы рекомендуем 
вместо этого говорить &ldquo;"
+"бесплатный&rdquo;."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android apps can track users' movements even when the user says <a href="
 "\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
 "permissions-data-collection-imei-ssid-location\"> not to allow them access "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary.de-diff.html    3 Aug 2019 11:31:18 -0000       1.110
+++ proprietary.de-diff.html    6 Aug 2019 08:29:30 -0000       1.111
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -130,14 +130,14 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -186,6 +186,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
@@ -242,16 +255,6 @@
     malicious&mdash;it protected users from surveillance by third
     parties&mdash;but that is a separate question.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -312,7 +315,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/03 11:31:18 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.de.po   3 Aug 2019 11:31:20 -0000       1.152
+++ proprietary.de.po   6 Aug 2019 08:29:30 -0000       1.153
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -439,6 +439,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -513,20 +528,6 @@
 "separate question."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary.es.po   4 Aug 2019 14:54:59 -0000       1.192
+++ proprietary.es.po   6 Aug 2019 08:29:30 -0000       1.193
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -303,6 +304,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses &ldquo;free&rdquo;-]
+# | {+refers+} to [-mean &ldquo;zero price.&rdquo; We recommend saying-]
+# | {+these proprietary apps as &ldquo;free&rdquo;. It should have said+}
+# | &ldquo;gratis&rdquo; instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+"Desafortunadamente, el artículo utiliza el término <cite>«free»</cite> 
para "
+"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -414,26 +440,6 @@
 "El cambio concreto descrito en el artículo no era malicioso, protegía a los 
"
 "usuarios de la vigilancia por parte de terceros, pero esa es otra cuestión."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-"Muchas aplicaciones de Android pueden rastrear los movimientos del usuario "
-"incluso cuando este <a href=\"https://www.theverge.com/2019/7/8/20686514/";
-"android-covert-channel-permissions-data-collection-imei-ssid-location\">no "
-"les permite obtener datos de localización</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-"Al parecer se trata de un defecto no intencionado de Android, aprovechado "
-"intencionalmente por aplicaciones maliciosas."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,6 +519,24 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Many Android apps can track users' movements even when the user says <a "
+#~ "href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+#~ "permissions-data-collection-imei-ssid-location\"> not to allow them "
+#~ "access to locations</a>."
+#~ msgstr ""
+#~ "Muchas aplicaciones de Android pueden rastrear los movimientos del "
+#~ "usuario incluso cuando este <a href=\"https://www.theverge.";
+#~ "com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-"
+#~ "imei-ssid-location\">no les permite obtener datos de localización</a>."
+
+#~ msgid ""
+#~ "This involves an apparently unintentional weakness in Android, exploited "
+#~ "intentionally by malicious apps."
+#~ msgstr ""
+#~ "Al parecer se trata de un defecto no intencionado de Android, aprovechado "
+#~ "intencionalmente por aplicaciones maliciosas."
+
+#~ msgid ""
 #~ "Cash of Clans is a good example of a gratis mobile game that its "
 #~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\";> "
 #~ "made very addictive</a> for a large proportion of its users&mdash;and "
@@ -564,13 +588,6 @@
 #~ "usuarios a fin de incrementar la adictividad de sus juegos."
 
 #~ msgid ""
-#~ "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
-#~ "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-#~ msgstr ""
-#~ "Desafortunadamente, el artículo utiliza el término <cite>«free»</cite> 
"
-#~ "para significar «precio cero». Recomendamos en su lugar decir: 
«gratis»."
-
-#~ msgid ""
 #~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/";
 #~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
 #~ "instrument of surveillance</a>. It lets thousands of trackers invade "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary.fr.po   3 Aug 2019 13:59:26 -0000       1.234
+++ proprietary.fr.po   6 Aug 2019 08:29:30 -0000       1.235
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2019-08-03 15:58+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -299,6 +300,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -412,26 +428,6 @@
 "(il évitait aux utilisateurs d'être espionnés par des tiers) mais c'est un 
"
 "autre problème."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-"Plusieurs applis pour Android pistent les utilisateurs même quand ils disent 
"
-"<a href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\">de ne pas leur donner accès 
"
-"à la géolocalisation</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-"Cela fait intervenir une faille apparemment involontaire d'Android, qui est "
-"exploitée sciemment par les applis malveillantes."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,3 +501,21 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Many Android apps can track users' movements even when the user says <a "
+#~ "href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+#~ "permissions-data-collection-imei-ssid-location\"> not to allow them "
+#~ "access to locations</a>."
+#~ msgstr ""
+#~ "Plusieurs applis pour Android pistent les utilisateurs même quand ils "
+#~ "disent <a href=\"https://www.theverge.com/2019/7/8/20686514/android-";
+#~ "covert-channel-permissions-data-collection-imei-ssid-location\">de ne pas "
+#~ "leur donner accès à la géolocalisation</a>."
+
+#~ msgid ""
+#~ "This involves an apparently unintentional weakness in Android, exploited "
+#~ "intentionally by malicious apps."
+#~ msgstr ""
+#~ "Cela fait intervenir une faille apparemment involontaire d'Android, qui "
+#~ "est exploitée sciemment par les applis malveillantes."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.it-diff.html    3 Aug 2019 11:31:21 -0000       1.122
+++ proprietary.it-diff.html    6 Aug 2019 08:29:30 -0000       1.123
@@ -45,8 +45,8 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
@@ -185,6 +185,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
@@ -241,16 +254,6 @@
     malicious&mdash;it protected users from surveillance by third
     parties&mdash;but that is a separate question.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -311,7 +314,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/03 11:31:21 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- proprietary.it.po   3 Aug 2019 11:31:21 -0000       1.161
+++ proprietary.it.po   6 Aug 2019 08:29:30 -0000       1.162
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -517,20 +532,6 @@
 "separate question."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.ja-diff.html    3 Aug 2019 11:31:21 -0000       1.125
+++ proprietary.ja-diff.html    6 Aug 2019 08:29:30 -0000       1.126
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -182,6 +182,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
@@ -238,16 +251,6 @@
     malicious&mdash;it protected users from surveillance by third
     parties&mdash;but that is a separate question.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -308,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/03 11:31:21 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.ja.po   3 Aug 2019 11:31:21 -0000       1.145
+++ proprietary.ja.po   6 Aug 2019 08:29:30 -0000       1.146
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -307,6 +307,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -381,20 +396,6 @@
 "separate question."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- proprietary.nl-diff.html    3 Aug 2019 11:31:21 -0000       1.123
+++ proprietary.nl-diff.html    6 Aug 2019 08:29:30 -0000       1.124
@@ -45,8 +45,8 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
@@ -185,6 +185,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
@@ -241,16 +254,6 @@
     malicious&mdash;it protected users from surveillance by third
     parties&mdash;but that is a separate question.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -311,7 +314,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/03 11:31:21 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary.nl.po   3 Aug 2019 11:31:22 -0000       1.135
+++ proprietary.nl.po   6 Aug 2019 08:29:30 -0000       1.136
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -345,6 +345,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -419,20 +434,6 @@
 "separate question."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary.pl-diff.html    3 Aug 2019 11:31:23 -0000       1.140
+++ proprietary.pl-diff.html    6 Aug 2019 08:29:30 -0000       1.141
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -183,6 +183,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
@@ -239,16 +252,6 @@
     malicious&mdash;it protected users from surveillance by third
     parties&mdash;but that is a separate question.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -309,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/03 11:31:23 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary.pl.po   3 Aug 2019 11:31:23 -0000       1.128
+++ proprietary.pl.po   6 Aug 2019 08:29:30 -0000       1.129
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -593,20 +608,6 @@
 "separate question."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.pot     3 Aug 2019 11:31:24 -0000       1.125
+++ proprietary.pot     6 Aug 2019 08:29:30 -0000       1.126
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a "
+"href=\"https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/\";>
 "
+"failed to detect a test virus</a>. All of them asked for dangerous "
+"permissions or contained advertising trackers, with seven being more risky "
+"than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as "
+"&ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a "
 
"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\";>
 "
 "bypass user's settings</a>, regulations, and privacy-enhancing features of "
@@ -325,19 +341,6 @@
 "separate question."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a "
-"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\";>
 "
-"not to allow them access to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.pt-br.po        3 Aug 2019 13:28:58 -0000       1.194
+++ proprietary.pt-br.po        6 Aug 2019 08:29:30 -0000       1.195
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2019-08-03 10:14-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -296,6 +297,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+"Infelizmente, o artigo usa “<i lang=\"en\">free</i>” no sentido de 
“preço "
+"zero”. Nós recomendamos dizer “grátis”."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -407,26 +429,6 @@
 "os usuários da vigilância de terceiros &ndash; mas essa é uma questão à "
 "parte."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-"Muitos aplicativos do Android podem rastrear os movimentos dos usuários "
-"quando o usuário fala que <a href=\"https://www.theverge.";
-"com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-"
-"imei-ssid-location\"> não permite-os acessar a localização</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-"Isso evolve uma aparente falha não intencional no Android, explorada "
-"intencionalmente por aplicativos maliciosos."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -502,6 +504,24 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "Many Android apps can track users' movements even when the user says <a "
+#~ "href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+#~ "permissions-data-collection-imei-ssid-location\"> not to allow them "
+#~ "access to locations</a>."
+#~ msgstr ""
+#~ "Muitos aplicativos do Android podem rastrear os movimentos dos usuários "
+#~ "quando o usuário fala que <a href=\"https://www.theverge.";
+#~ "com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-"
+#~ "imei-ssid-location\"> não permite-os acessar a localização</a>."
+
+#~ msgid ""
+#~ "This involves an apparently unintentional weakness in Android, exploited "
+#~ "intentionally by malicious apps."
+#~ msgstr ""
+#~ "Isso evolve uma aparente falha não intencional no Android, explorada "
+#~ "intencionalmente por aplicativos maliciosos."
+
+#~ msgid ""
 #~ "Cash of Clans is a good example of a gratis mobile game that its "
 #~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\";> "
 #~ "made very addictive</a> for a large proportion of its users&mdash;and "
@@ -552,13 +572,6 @@
 #~ "aumentar o vício em seus jogos."
 
 #~ msgid ""
-#~ "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
-#~ "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-#~ msgstr ""
-#~ "Infelizmente, o artigo usa “<i lang=\"en\">free</i>” no sentido de 
“preço "
-#~ "zero”. Nós recomendamos dizer “grátis”."
-
-#~ msgid ""
 #~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/";
 #~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
 #~ "instrument of surveillance</a>. It lets thousands of trackers invade "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- proprietary.ru.po   5 Aug 2019 07:28:36 -0000       1.270
+++ proprietary.ru.po   6 Aug 2019 08:29:30 -0000       1.271
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses &ldquo;free&rdquo;-]
+# | {+refers+} to [-mean &ldquo;zero price.&rdquo; We recommend saying-]
+# | {+these proprietary apps as &ldquo;free&rdquo;. It should have said+}
+# | &ldquo;gratis&rdquo; instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+"К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в значении "
+"&ldquo;нулевой цены&rdquo;. Мы рекомендуем 
вместо этого говорить &ldquo;"
+"бесплатный&rdquo;."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -416,26 +443,6 @@
 "оно защищало пользователей от слежки со 
стороны третьих лиц&nbsp;&mdash; но "
 "это отдельный вопрос."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-"Многие приложения Android могут отслеживать 
перемещения пользователей, даже "
-"когда пользователь <a 
href=\"https://www.theverge.com/2019/7/8/20686514/";
-"android-covert-channel-permissions-data-collection-imei-ssid-location\"> не 
"
-"позволяет им получать доступ к 
местоположению</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-"Это связано с очевидно непреднамеренной 
слабостью в Android, преднамеренно "
-"используемой вредоносными приложениями."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -515,6 +522,25 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Many Android apps can track users' movements even when the user says <a "
+#~ "href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
+#~ "permissions-data-collection-imei-ssid-location\"> not to allow them "
+#~ "access to locations</a>."
+#~ msgstr ""
+#~ "Многие приложения Android могут 
отслеживать перемещения пользователей, "
+#~ "даже когда пользователь <a 
href=\"https://www.theverge.";
+#~ "com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-"
+#~ "imei-ssid-location\"> не позволяет им получать 
доступ к местоположению</"
+#~ "a>."
+
+#~ msgid ""
+#~ "This involves an apparently unintentional weakness in Android, exploited "
+#~ "intentionally by malicious apps."
+#~ msgstr ""
+#~ "Это связано с очевидно непреднамеренной 
слабостью в Android, "
+#~ "преднамеренно используемой 
вредоносными приложениями."
+
+#~ msgid ""
 #~ "Cash of Clans is a good example of a gratis mobile game that its "
 #~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\";> "
 #~ "made very addictive</a> for a large proportion of its users&mdash;and "
@@ -564,14 +590,6 @@
 #~ "сильную зависимость."
 
 #~ msgid ""
-#~ "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
-#~ "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
-#~ msgstr ""
-#~ "К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в "
-#~ "значении &ldquo;нулевой цены&rdquo;. Мы 
рекомендуем вместо этого говорить "
-#~ "&ldquo;бесплатный&rdquo;."
-
-#~ msgid ""
 #~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/";
 #~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
 #~ "instrument of surveillance</a>. It lets thousands of trackers invade "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary.zh-tw-diff.html 3 Aug 2019 11:31:25 -0000       1.101
+++ proprietary.zh-tw-diff.html 6 Aug 2019 08:29:30 -0000       1.102
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -130,14 +130,14 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -186,6 +186,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
@@ -242,16 +255,6 @@
     malicious&mdash;it protected users from surveillance by third
     parties&mdash;but that is a separate question.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -312,7 +315,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/03 11:31:25 $
+$Date: 2019/08/06 08:29:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary.zh-tw.po        3 Aug 2019 11:31:25 -0000       1.112
+++ proprietary.zh-tw.po        6 Aug 2019 08:29:30 -0000       1.113
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -417,6 +417,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -491,20 +506,6 @@
 "separate question."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-";
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- pt-br.po    3 Aug 2019 13:28:58 -0000       1.151
+++ pt-br.po    6 Aug 2019 08:29:30 -0000       1.152
@@ -4829,6 +4829,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+"Infelizmente, o artigo usa “<i lang=\"en\">free</i>” no sentido de 
“preço "
+"zero”. Nós recomendamos dizer “grátis”."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- ru.po       5 Aug 2019 07:05:28 -0000       1.253
+++ ru.po       6 Aug 2019 08:29:30 -0000       1.254
@@ -6238,6 +6238,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses &ldquo;free&rdquo;-]
+# | {+refers+} to [-mean &ldquo;zero price.&rdquo; We recommend saying-]
+# | {+these proprietary apps as &ldquo;free&rdquo;. It should have said+}
+# | &ldquo;gratis&rdquo; instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+"К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в значении "
+"&ldquo;нулевой цены&rdquo;. Мы рекомендуем 
вместо этого говорить &ldquo;"
+"бесплатный&rdquo;."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
@@ -6541,20 +6567,21 @@
 "and privacy-enhancing features of the operating system, in order to gather "
 "as much private data as they possibly can."
 msgstr ""
-"Многие беспринципные разработчики 
мобильных приложений продолжают находить 
способы <a href="
-"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
-"even-after-you-deny-permissions/\"> обхода настроек 
пользователя</a>, норм "
-"и возможностей операционной системы, 
связанных с защитой личной жизни, "
-"чтобы собирать как можно больше 
конфиденциальных данных."
+"Многие беспринципные разработчики 
мобильных приложений продолжают находить "
+"способы <a 
href=\"https://www.cnet.com/news/more-than-1000-android-apps-";
+"harvest-your-data-even-after-you-deny-permissions/\"> обхода 
настроек "
+"пользователя</a>, норм и возможностей 
операционной системы, связанных с "
+"защитой личной жизни, чтобы собирать как 
можно больше конфиденциальных "
+"данных."
 
 #. type: Content of: <ul><li><p>
 msgid ""
 "Thus, we can't trust rules against spying.  What we can trust is having "
 "control over the software we run."
 msgstr ""
-"Таким образом, мы не можем полагаться на 
правила против шпионажа. "
-"На что мы можем полагаться&nbsp;&mdash; это на 
контроль над программами, "
-"с которыми мы работаем."
+"Таким образом, мы не можем полагаться на 
правила против шпионажа. На что мы "
+"можем полагаться&nbsp;&mdash; это на контроль 
над программами, с которыми мы "
+"работаем."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- zh-tw.po    3 Aug 2019 11:31:25 -0000       1.117
+++ zh-tw.po    6 Aug 2019 08:29:30 -0000       1.118
@@ -4387,6 +4387,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-";
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as &ldquo;"
+"free&rdquo;. It should have said &ldquo;gratis&rdquo; instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Siri, Alexa, and all the other voice-control systems can be <a href="
 "\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
 "astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]