www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Tue, 10 Sep 2019 07:33:44 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/09/10 07:33:43

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.467&r2=1.468
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.241&r2=1.242
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.561&r2=1.562
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.250&r2=1.251
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.133&r2=1.134

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- de.po       7 Sep 2019 16:29:27 -0000       1.133
+++ de.po       10 Sep 2019 11:33:42 -0000      1.134
@@ -8025,6 +8025,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- es.po       8 Sep 2019 16:28:37 -0000       1.183
+++ es.po       10 Sep 2019 11:33:42 -0000      1.184
@@ -7080,6 +7080,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- fr.po       8 Sep 2019 06:54:00 -0000       1.231
+++ fr.po       10 Sep 2019 11:33:42 -0000      1.232
@@ -6703,6 +6703,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- it.po       7 Sep 2019 16:29:27 -0000       1.133
+++ it.po       10 Sep 2019 11:33:42 -0000      1.134
@@ -7564,6 +7564,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- ja.po       7 Sep 2019 16:29:27 -0000       1.140
+++ ja.po       10 Sep 2019 11:33:42 -0000      1.141
@@ -5791,6 +5791,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- malware-mobiles.de-diff.html        6 Aug 2019 08:29:29 -0000       1.62
+++ malware-mobiles.de-diff.html        10 Sep 2019 11:33:42 -0000      1.63
@@ -511,6 +511,18 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
@@ -1405,7 +1417,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/06 08:29:29 $
+$Date: 2019/09/10 11:33:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- malware-mobiles.de.po       6 Aug 2019 08:29:29 -0000       1.119
+++ malware-mobiles.de.po       10 Sep 2019 11:33:42 -0000      1.120
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -874,6 +874,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- malware-mobiles.es.po       11 Aug 2019 11:02:59 -0000      1.140
+++ malware-mobiles.es.po       10 Sep 2019 11:33:42 -0000      1.141
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -740,6 +741,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- malware-mobiles.fr.po       6 Aug 2019 11:22:24 -0000       1.166
+++ malware-mobiles.fr.po       10 Sep 2019 11:33:42 -0000      1.167
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2019-08-06 13:21+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -739,6 +740,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- malware-mobiles.it-diff.html        6 Aug 2019 08:29:30 -0000       1.67
+++ malware-mobiles.it-diff.html        10 Sep 2019 11:33:42 -0000      1.68
@@ -543,6 +543,18 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
@@ -1444,7 +1456,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/06 08:29:30 $
+$Date: 2019/09/10 11:33:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- malware-mobiles.it.po       6 Aug 2019 08:29:30 -0000       1.119
+++ malware-mobiles.it.po       10 Sep 2019 11:33:42 -0000      1.120
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -825,6 +825,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- malware-mobiles.ja-diff.html        6 Aug 2019 08:29:30 -0000       1.83
+++ malware-mobiles.ja-diff.html        10 Sep 2019 11:33:42 -0000      1.84
@@ -504,6 +504,18 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
@@ -1286,7 +1298,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/08/06 08:29:30 $
+$Date: 2019/09/10 11:33:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- malware-mobiles.ja.po       6 Aug 2019 08:29:30 -0000       1.109
+++ malware-mobiles.ja.po       10 Sep 2019 11:33:42 -0000      1.110
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -623,6 +623,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-mobiles.pot 6 Aug 2019 08:29:30 -0000       1.85
+++ malware-mobiles.pot 10 Sep 2019 11:33:42 -0000      1.86
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -503,6 +503,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a "
+"href=\"https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/\";>
 "
+"A US prosecutor has demanded the list of all the 10,000 or more people who "
+"have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a "
 
"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\";>
 "
 "bypass user's settings</a>, regulations, and privacy-enhancing features of "

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- malware-mobiles.ru.po       6 Aug 2019 08:58:51 -0000       1.200
+++ malware-mobiles.ru.po       10 Sep 2019 11:33:42 -0000      1.201
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -730,6 +731,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- nl.po       7 Sep 2019 16:29:27 -0000       1.134
+++ nl.po       10 Sep 2019 11:33:42 -0000      1.135
@@ -5332,6 +5332,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- pl.po       7 Sep 2019 16:29:27 -0000       1.133
+++ pl.po       10 Sep 2019 11:33:42 -0000      1.134
@@ -4663,6 +4663,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- pot 7 Sep 2019 16:29:27 -0000       1.132
+++ pot 10 Sep 2019 11:33:42 -0000      1.133
@@ -4455,6 +4455,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary-surveillance.de-diff.html       7 Sep 2019 13:29:58 -0000       
1.92
+++ proprietary-surveillance.de-diff.html       10 Sep 2019 11:33:42 -0000      
1.93
@@ -967,6 +967,18 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
@@ -3548,7 +3560,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 13:29:58 $
+$Date: 2019/09/10 11:33:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- proprietary-surveillance.de.po      7 Sep 2019 13:29:58 -0000       1.307
+++ proprietary-surveillance.de.po      10 Sep 2019 11:33:42 -0000      1.308
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1953,6 +1953,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.467
retrieving revision 1.468
diff -u -b -r1.467 -r1.468
--- proprietary-surveillance.fr.po      7 Sep 2019 13:56:54 -0000       1.467
+++ proprietary-surveillance.fr.po      10 Sep 2019 11:33:42 -0000      1.468
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2019-09-07 15:44+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1476,6 +1477,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary-surveillance.it-diff.html       7 Sep 2019 13:29:58 -0000       
1.159
+++ proprietary-surveillance.it-diff.html       10 Sep 2019 11:33:42 -0000      
1.160
@@ -1088,20 +1088,21 @@
     reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
     often</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>legal threat 
demanding a lot of money.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts</strong></del></span> <span class="inserted"><ins><em>legal 
threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>data in the phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is</em></ins></span> not <span class="removed"><del><strong>only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts</strong></del></span> <span class="inserted"><ins><em>a cure 
for the injustice</em></ins></span> of <span class="removed"><del><strong>data 
in</strong></del></span> <span class="inserted"><ins><em>nonfree software. It 
may avoid
-    paying for</em></ins></span> the <span class="removed"><del><strong>phone, 
and in server accounts,</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it 
<span class="removed"><del><strong>can
+    makes</em></ins></span> it <span class="removed"><del><strong>can
   alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the 
ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span 
class="removed"><del><strong>example</strong></del></span> illustrates <span 
class="removed"><del><strong>how &ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>that making unauthorized copies of nonfree software
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying</em></ins></span> for <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1111,135 +1112,141 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
-    of</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;
-        for surveillance is inadequate</strong></del></span> <span 
class="inserted"><ins><em>operating system, in order to 
gather</em></ins></span> as <span class="removed"><del><strong>a 
protection</strong></del></span> <span class="inserted"><ins><em>much private 
data as
-    they possibly can.&lt;/p&gt;
-
-    &lt;p&gt;Thus, we can't trust rules</em></ins></span> against <span 
class="removed"><del><strong>massive
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program</em></ins></span> is <span class="removed"><del><strong>inadequate 
as</strong></del></span> a <span class="removed"><del><strong>protection 
against massive
         surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle 
sight.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when the user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
       Symphony surveillance software snoop on what radio and TV programs 
       are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
       such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,
-      and suggests</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
-    for contraception.&lt;/p&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
+    of</em></ins></span> the <span class="removed"><del><strong>picture you 
take according to who
+      is</strong></del></span> <span class="inserted"><ins><em>operating 
system,</em></ins></span> in <span class="removed"><del><strong>the 
frame.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as</em></ins></span> you <span 
class="inserted"><ins><em>must expect from nonfree
-    programs.&lt;/p&gt;
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are 
likely</strong></del></span> <span 
class="inserted"><ins><em>order</em></ins></span> to <span 
class="removed"><del><strong>be
+      sent across</strong></del></span> <span class="inserted"><ins><em>gather 
as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook</strong></del></span> <span 
class="inserted"><ins><em>software we run.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span class="removed"><del><strong>share 
the picture you take according</strong></del></span> <span 
class="inserted"><ins><em>run a proprietary phone 
app&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>who
-      is in</strong></del></span> <span class="inserted"><ins><em>be allowed 
into</em></ins></span>
-    the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="inserted"><ins><em>app is a</em></ins></span> 
spyware <span class="removed"><del><strong>feature seems to require online 
access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track</em></ins></span>
+    users' <span class="removed"><del><strong>pictures are private
+      anymore,</strong></del></span> <span 
class="inserted"><ins><em>movements</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span class="inserted"><ins><em>employers 
and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can 
easily</em></ins></span> be
-      <span class="removed"><del><strong>sent across</strong></del></span>
-    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
 
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
-    and <span class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>based</strong></del></span> <span 
class="inserted"><ins><em>secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
+    for contraception.&lt;/p&gt;
 
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>freedom 
to make their own pregnancy choices. Don't use
-    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
-    free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>users, 
too, as you must expect from nonfree
+    programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>same 
thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is 
available from &lt;a
-    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>snooping). In August
-      2015 it</strong></del></span> &lt;a
+  &lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
+      demanded users submit</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span> <span class="inserted"><ins><em>run a 
proprietary phone app&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
 
-      &lt;p&gt;This article shows the &lt;a
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>be allowed into</em></ins></span>
+    the <span class="removed"><del><strong>&lt;a
 
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>way
+      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;
+
+    &lt;p&gt;This app is a spyware</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as</strong></del></span> 
<span class="inserted"><ins><em>can snoop on</em></ins></span> a <span 
class="removed"><del><strong>way
       to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>new one</em></ins></span> is <span 
class="removed"><del><strong>a typical example of
-      the attitude of the proprietary software industry towards
+      whether they want that. This is a typical example of
+      the attitude</strong></del></span> <span 
class="inserted"><ins><em>lot</em></ins></span> of
+    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</strong></del></span> 
<span class="inserted"><ins><em>movements of Android phones</em></ins></span> 
and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>the user 
has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 is <span class="removed"><del><strong>doing this in a way that at 
least</strong></del></span> <span class="inserted"><ins><em>often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data</em></ins></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;anonymized</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>aggregated,&rdquo; 
it can easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>women's rights 
to equal employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
       
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>iPhones
-    running Goggle apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is</strong></del></span> 
<span class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>addition to
-      the snooping done by</strong></del></span> the phone <span 
class="removed"><del><strong>company, and perhaps by the OS in the
-      phone.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. 
This</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one</em></ins></span> is <span class="removed"><del><strong>in 
addition to
+      the snooping done by</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>movements of Android phones</em></ins></span> and 
<span class="removed"><del><strong>perhaps by</strong></del></span> <span 
class="inserted"><ins><em>iPhones
+    running Goggle apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software</em></ins></span> in the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
 
-      &lt;p&gt;Don't</strong></del></span> <span class="inserted"><ins><em>has 
to</em></ins></span> be <span class="removed"><del><strong>distracted by the 
question of whether</strong></del></span> <span 
class="inserted"><ins><em>responsible for sending</em></ins></span>
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>phone has to</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>responsible for 
sending</em></ins></span>
     the <span class="removed"><del><strong>app developers get
       users</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -1248,24 +1255,24 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
     &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user</strong></del></span>
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it asked the 
user</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
+    preinstalled nonfree apps that have access</em></ins></span> to
+      <span class="removed"><del><strong>approve sending 
personal</strong></del></span> <span 
class="inserted"><ins><em>sensitive</em></ins></span> data <span 
class="inserted"><ins><em>without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the</em></ins></span> data, <span class="removed"><del><strong>including 
geolocation, for use by companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>or pass</em></ins></span> it <span 
class="removed"><del><strong>asked the user</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps 
that have access</em></ins></span> to
+    the data, or pass it on to user-installed apps that have 
access</em></ins></span> to
     the <span class="removed"><del><strong>app developer</strong></del></span> 
<span class="inserted"><ins><em>network</em></ins></span> but <span 
class="removed"><del><strong>did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>no direct access</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows</strong></del></span> 
the
-      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>data. This results in massive
-    surveillance on which</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>user has 
absolutely no control.&lt;/p&gt;
+      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>no direct access</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>the data.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>results in massive
+    surveillance on which</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app</strong></del></span> <span class="inserted"><ins><em>24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
     
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;</em></ins></span>
     send <span class="inserted"><ins><em>sensitive personal data to third 
parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
@@ -1326,90 +1333,52 @@
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
     <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use</em></ins></span> and <span 
class="removed"><del><strong>i-Que</strong></del></span>
     <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%)</em></ins></span> 
transmit 
-      <span class="removed"><del><strong>&lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+    78,000 have been analyzed, of which 24,000 (31%)</em></ins></span> 
transmit <span class="inserted"><ins><em>the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
       a speech recognition company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>listen in on a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by
-      <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone.</strong></del></span> 
<span class="inserted"><ins><em>total) link this ID to hardware 
identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in no 
hurry to take action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users could</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action.</em></ins></span> This 
<span class="inserted"><ins><em>proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps</em></ins></span> have
-      <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued</strong></del></span> <span class="inserted"><ins><em>a 
surveillance feature</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>a
-      data broker, the data broker would have been able</strong></del></span>
-    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as &lt;a
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them</em></ins></span> to <span class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>phishing sites 
that stole their credentials. Furthermore,</em></ins></span>
-    the user <span class="removed"><del><strong>was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>interface of most of them was 
designed</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
-    there is no easy way</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
 <span class="inserted"><ins><em>150 most popular
-    gratis VPN apps in Google Play</em></ins></span> found <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>that &lt;a
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>access 
the data&lt;/a&gt;
-      collected by the manufacturer's</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; due to DNS 
leaks. In
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
     potentially also be used to spy on users. Other technical flaws were
@@ -1755,8 +1724,8 @@
     &lt;p&gt;The article takes for granted that the usual analytics tools are
     legitimate, but is that valid? Software developers have no right to
     analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other</em></ins></span> 
snooping.&lt;/p&gt;
-  <span class="inserted"><ins><em>&lt;/li&gt;
+    that snoop are just as wrong as any other snooping.&lt;/p&gt;
+  &lt;/li&gt;
 
   &lt;li id="M201510300"&gt;
     &lt;p&gt;More than 73% and 47% of mobile applications, from Android and iOS
@@ -1867,9 +1836,9 @@
   &lt;li id="M201908151"&gt;
     &lt;p&gt;Skype refuses to say whether it can &lt;a
     
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    on calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That <span class="inserted"><ins><em>almost certainly means it 
can do so.&lt;/p&gt;
+    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307110"&gt;
@@ -2128,26 +2097,24 @@
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    &lt;p&gt;Proper laws</em></ins></span> would
+      <span class="removed"><del><strong>enable crackers</strong></del></span> 
<span class="inserted"><ins><em>say that TVs are not allowed to report what the
     user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
     &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>user watches,</em></ins></span> and the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
+    reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    &lt;p&gt;Even worse, it &lt;a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="inserted"><ins><em>stop this, but any
-    product could</em></ins></span> spy <span class="inserted"><ins><em>this 
way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
@@ -2157,24 +2124,18 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
-    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
-
-
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
     
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
@@ -2214,56 +2175,107 @@
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
+    to <span class="removed"><del><strong>listen in on</strong></del></span> 
<span class="inserted"><ins><em>outsmart you.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product 
as shipped doesn't act as</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span>
-    <span class="inserted"><ins><em>listening device, remote changes to the 
code could surely convert it
-    into one.&lt;/p&gt;
+    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and even 
speak</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert 
it</em></ins></span>
+    into <span class="inserted"><ins><em>one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201703140"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;</em></ins></span>
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on</em></ins></span> its <span 
class="removed"><del><strong>own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure to place new items on top under each 
subsection --&gt;
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;
+
+    &lt;p&gt;The company that made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for collecting lots of personal information about how people
+    used it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user <span class="removed"><del><strong>was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2273,26 +2285,14 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>statements 
about their
-    products, rather than free software which users could have checked
-    and changed.&lt;/p&gt;
-
-    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about how people
-    used it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>data may be
-    true, but</em></ins></span> it <span class="removed"><del><strong>through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data 
to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
       
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
@@ -3300,7 +3300,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 13:29:58 $
+$Date: 2019/09/10 11:33:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- proprietary-surveillance.it.po      7 Sep 2019 13:29:58 -0000       1.320
+++ proprietary-surveillance.it.po      10 Sep 2019 11:33:42 -0000      1.321
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1896,6 +1896,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary-surveillance.ja-diff.html       7 Sep 2019 13:29:58 -0000       
1.175
+++ proprietary-surveillance.ja-diff.html       10 Sep 2019 11:33:42 -0000      
1.176
@@ -1018,19 +1018,40 @@
 scans your mobile phone's photo collections for known faces&lt;/a&gt;,
       and suggests you to share the picture you take 
according</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
+    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;
 
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across the wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</strong></del></span> <span class="inserted"><ins><em>running 
it&lt;/a&gt;. The result</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware (DRM and snooping). 
In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting to realize</strong></del></span>
+    <span class="inserted"><ins><em>often a legal threat demanding a lot of 
money.&lt;/p&gt;
+
+    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>used for repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>illustrates that making unauthorized copies of 
nonfree software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less nasty.&lt;/p&gt;
+    &lt;p&gt;This <span class="removed"><del><strong>article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
+    is <span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1038,146 +1059,98 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
-    of <span class="removed"><del><strong>Facebook users' pictures 
are</strong></del></span> <span class="inserted"><ins><em>the operating system, 
in order to gather as much</em></ins></span> private
-      <span class="removed"><del><strong>anymore,</strong></del></span> <span 
class="inserted"><ins><em>data as
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a</em></ins></span> proprietary 
<span class="removed"><del><strong>apps for mobile devices report which other
+    apps the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    <span class="inserted"><ins><em>program</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way that at least</strong></del></span> <span 
class="inserted"><ins><em>form of surveillance.  There</em></ins></span> is 
<span class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>a
+    proprietary program</em></ins></span> for <span 
class="removed"><del><strong>children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>adjusting a 
certain telescopic rifle sight.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is</strong></del></span> 
<span class="inserted"><ins><em>operating system,</em></ins></span> in <span 
class="removed"><del><strong>addition</strong></del></span> <span 
class="inserted"><ins><em>order</em></ins></span> to <span 
class="inserted"><ins><em>gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;
+    having control over</em></ins></span> the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>software we 
run.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>says &lt;a
+    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>the
+      phone.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
+      &lt;p&gt;Don't be distracted</strong></del></span> <span 
class="inserted"><ins><em>Android,
+    exploited intentionally</em></ins></span> by <span 
class="removed"><del><strong>the question of whether the</strong></del></span> 
<span class="inserted"><ins><em>malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>based</strong></del></span> <span 
class="inserted"><ins><em>secretly a &lt;a
+  &lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span> is <span 
class="removed"><del><strong>no excuse</strong></del></span> <span 
class="inserted"><ins><em>secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
+    tool</em></ins></span> for <span 
class="removed"><del><strong>malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>users, 
too, as you must expect from nonfree
-    programs.&lt;/p&gt;
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span> <span class="inserted"><ins><em>run a 
proprietary phone app&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>realize that it is 
nasty.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be 
allowed into
-    the event.&lt;/p&gt;</em></ins></span>
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> is a <span 
class="removed"><del><strong>typical example of
-      the attitude</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop on a lot</em></ins></span> of 
<span class="removed"><del><strong>the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+    &lt;p&gt;This app is a spyware that can snoop on a lot of
+    sensitive</em></ins></span> data, including <span 
class="removed"><del><strong>geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
-    apps the user</strong></del></span>
-    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and</em></ins></span> has
-    <span class="removed"><del><strong>installed.</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and
-    optional&lt;/a&gt;. Not as bad as what</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span> <span class="inserted"><ins><em>user's location and 
contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on 
the user&lt;/a&gt;. This</strong></del></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>often &lt;a
+  &lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily</em></ins></span> be <span 
class="removed"><del><strong>distracted by</strong></del></span>
-    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>app developers get
-      users</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    available</em></ins></span> to <span class="inserted"><ins><em>employers 
and insurance companies&lt;/a&gt;. Even though</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="inserted"><ins><em>can 
easily be
+    traced back</em></ins></span> to <span class="removed"><del><strong>other 
companies.  This shows</strong></del></span> the
+      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span class="inserted"><ins><em>equal 
employment
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>surveillance: 
why should</strong></del></span> <span class="inserted"><ins><em>equal 
employment
     and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
-    spying on you</em></ins></span> is <span class="removed"><del><strong>no 
excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Goggle apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to
-      <span class="removed"><del><strong>approve</strong></del></span> <span 
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span 
class="removed"><del><strong>personal</strong></del></span>
-    <span class="inserted"><ins><em>the location</em></ins></span> data to 
<span class="removed"><del><strong>the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;
+    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>do so.</em></ins></span> A <span 
class="removed"><del><strong>free software flashlight</strong></del></span>
+    <span class="inserted"><ins><em>free-software</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass</em></ins></span> it <span 
class="inserted"><ins><em>on</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have access to
-    the network but no direct access to the data.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>results in massive
-    surveillance on which</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;</em></ins></span>
-    send <span class="inserted"><ins><em>sensitive personal data to third 
parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
-    medical condition.&lt;/p&gt;
-
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. 
In</em></ins></span> any <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>case,
-    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1186,22 +1159,25 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>that does more 
or less the same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>GeForce Experience</strong></del></span>
-    <span class="inserted"><ins><em>library for building mobile apps, which 
also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
-    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>personal
-    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Goggle apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data</em></ins></span> for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
       Here's information on
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
@@ -1218,365 +1194,213 @@
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows</em></ins></span> that <span 
class="removed"><del><strong>makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>no one can trust a nonfree program, not even the
-    developers</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued</strong></del></span> <span class="inserted"><ins><em>be 
responsible</em></ins></span> for <span class="removed"><del><strong>collecting 
lots</strong></del></span> <span class="inserted"><ins><em>sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives</em></ins></span> information <span 
class="removed"><del><strong>about</strong></del></span> <span 
class="inserted"><ins><em>on &lt;a
-    href="https://www.appcensus.mobi"&gt;</em></ins></span> how
-    <span class="removed"><del><strong>people</strong></del></span> <span 
class="inserted"><ins><em>Android apps</em></ins></span> use <span 
class="removed"><del><strong>it&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="removed"><del><strong>personal information about how
+    people use it&lt;/a&gt;.&lt;/p&gt;
 
-       &lt;p&gt;The company's statement that it anonymizes the data may be
-        true, but it doesn't really matter. If it sells</strong></del></span> 
<span class="inserted"><ins><em>and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>a
-        data broker, the data broker can figure out who the user is.&lt;/p&gt;
+       &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes the</strong></del></span> <span 
class="inserted"><ins><em>have access to sensitive</em></ins></span> data <span 
class="inserted"><ins><em>without
+    users' knowledge&lt;/a&gt;. These hidden apps</em></ins></span> may <span 
class="removed"><del><strong>be
+        true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>either call home with
+    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>on to user-installed apps that have access 
to</em></ins></span>
+    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access</em></ins></span> to 
<span class="removed"><del><strong>a
+        data broker,</strong></del></span> the <span 
class="removed"><del><strong>data broker can figure out 
who</strong></del></span> <span class="inserted"><ins><em>data. This results in 
massive
+    surveillance on which</em></ins></span> the user <span 
class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>has absolutely no control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span> <span class="inserted"><ins><em>other 
companies, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
+        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
         on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
       &lt;p&gt;The app reports the temperature</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by
-      <span class="removed"><del><strong>minute (thus, indirectly, whether 
it</strong></del></span> <span class="inserted"><ins><em>resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>surrounded by a person's
-      body), and the vibration frequency.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can 
use</em></ins></span> it <span class="removed"><del><strong>is surrounded by 
a</strong></del></span>
+    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
+    medical condition.&lt;/p&gt;
 
-      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in 
apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users can check
-      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users, and 
redirecting
-    them to phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
-    there</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span> 
really
-<span class="removed"><del><strong>clean since &lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>do.&lt;/p&gt;
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that &lt;a
+    gratis VPN apps in Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>protect their 
users’ privacy&lt;/a&gt; due to DNS leaks. In
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>users. 
Other technical flaws were
+    potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>Parliament
-  this way, because</strong></del></span>
-    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but</em></ins></span> they <span 
class="removed"><del><strong>pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>are &lt;em&gt;not&lt;/em&gt;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;.</em></ins></span> The 
<span class="removed"><del><strong>Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>company</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding that it 
notify</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>will do
-    with</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>using it to outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>about a side issue. 
What the company does
+    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only the
-      Kindle:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;</em></ins></span>
-    report <span class="removed"><del><strong>even which 
page</strong></del></span> <span class="inserted"><ins><em>on</em></ins></span> 
the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>user's 
actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook can correlate the data it obtains from the same machine via
-    various apps. Some of them</em></ins></span> send <span 
class="removed"><del><strong>lots</strong></del></span> <span 
class="inserted"><ins><em>Facebook detailed information about
+    various apps. Some of them send Facebook detailed information about
     the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless</em></ins></span> of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>whether the user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>system has 
no authentication</strong></del></span> <span class="inserted"><ins><em>user's 
location even</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>users disable &ldquo;location
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
-    tracking, but most users will</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>tricked by</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>phone company to track the 
car's</strong></del></span> <span 
class="inserted"><ins><em>user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But I can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less</em></ins></span> about <span 
class="removed"><del><strong>drivers' movements&lt;/a&gt;,
-      which</strong></del></span> <span class="inserted"><ins><em>sports, you 
will benefit in
-    many ways. This</em></ins></span> is <span 
class="removed"><del><strong>made available</strong></del></span> <span 
class="inserted"><ins><em>one more.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies,</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
-    and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40%</em></ins></span> of <span class="removed"><del><strong>toll-collection 
systems, mentioned in this article, is not
-      really a matter</strong></del></span> <span 
class="inserted"><ins><em>the apps were
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
     found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods</em></ins></span> of <span 
class="inserted"><ins><em>snooping, in these</em></ins></span> proprietary 
<span class="removed"><del><strong>surveillance. These systems are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by 
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
-    source code they cannot look at.</em></ins></span>  The other
-      <span class="removed"><del><strong>cases mentioned are done by 
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps 
might be snooping</em></ins></span>
-    in <span class="removed"><del><strong>the car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
-    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>c.&lt;/a&gt;). The company says it 
doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>free software
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+  &lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>place new items on top 
under</strong></del></span> each <span class="removed"><del><strong>subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
-    <span class="inserted"><ins><em>other but not</em></ins></span> to <span 
class="inserted"><ins><em>the server's database.&lt;/p&gt;
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service</em></ins></span>
-    spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span</strong></del></span> <span class="inserted"><ins><em>users even 
more than users expected. It &lt;a
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
@@ -2294,39 +2118,176 @@
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
-    body), as well as the vibration frequency.&lt;/p&gt;
+    minute (thus, indirectly, whether it was surrounded by a</em></ins></span> 
person's
+    body), <span class="removed"><del><strong>and</strong></del></span> <span 
class="inserted"><ins><em>as well as</em></ins></span> the vibration 
frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which users could have checked
-    and changed.&lt;/p&gt;
+    products, rather than free software which users <span 
class="removed"><del><strong>can check
+      and change.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults.&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>could have 
checked
+    and changed.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>company that made</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but it doesn't really matter. If</em></ins></span> it <span 
class="inserted"><ins><em>had sold the data</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out 
who</em></ins></span> the
+    user <span class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span class="inserted"><ins><em>pay a total 
of C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
+    customers.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>nonfree software are</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  effectively
+  anyone</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to</em></ins></span> access <span 
class="removed"><del><strong>its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>do because</strong></del></span> <span 
class="inserted"><ins><em>these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2334,12 +2295,15 @@
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen</em></ins></span> in <span class="inserted"><ins><em>on 
a child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span>
+    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
@@ -2352,16 +2316,16 @@
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span</em></ins></span> class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    to snoop on other people, DJI</em></ins></span> is
+    <span class="removed"><del><strong>proprietary,</strong></del></span> 
<span class="inserted"><ins><em>in many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2375,78 +2339,123 @@
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    when</em></ins></span> it <span class="removed"><del><strong>demands blind 
faith</strong></del></span> <span class="inserted"><ins><em>is not supposed to 
listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
-    users were easily identified from these recordings.&lt;/p&gt;
+    users were easily identified</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what it records or sends.&lt;/p&gt;
+    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying to better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google service.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is</em></ins></span> no <span class="removed"><del><strong>one 
connects</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> to <span 
class="inserted"><ins><em>see or control what it records or sends.&lt;/p&gt;
 
-  &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings</em></ins></span> made <span 
class="inserted"><ins><em>without</em></ins></span> a <span 
class="removed"><del><strong>joke: The</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt), and sends
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
+    get commands that</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send to some Google 
service.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more</em></ins></span> information 
<span class="removed"><del><strong>about drivers' movements&lt;/a&gt;,
+      which</strong></del></span> <span class="inserted"><ins><em>from users
+    than</em></ins></span> is <span class="inserted"><ins><em>necessary for 
correct functioning (time, location,
+    recordings</em></ins></span> made <span 
class="removed"><del><strong>available to car manufacturers, insurance 
companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span 
class="inserted"><ins><em>without</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
     even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on</em></ins></span> other <span 
class="removed"><del><strong>day</strong></del></span> <span 
class="inserted"><ins><em>servers&lt;/a&gt;, where they can be accessed by
-    advertising companies and government agencies. In other words,
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>invasion isn't 
done</strong></del></span> <span class="inserted"><ins><em>data remain on other 
servers&lt;/a&gt;, where they can be accessed</em></ins></span> by <span 
class="removed"><del><strong>malware. The</strong></del></span>
+    <span class="inserted"><ins><em>advertising companies and government 
agencies. In</em></ins></span> other
+      <span class="removed"><del><strong>cases mentioned</strong></del></span> 
<span class="inserted"><ins><em>words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As</em></ins></span> a <span class="removed"><del><strong>woman 
came up</strong></del></span> <span class="inserted"><ins><em>result, Amazon 
has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
+    the devices</em></ins></span> are <span class="removed"><del><strong>done 
by proprietary malware</strong></del></span> <span 
class="inserted"><ins><em>tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
     in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The 
Google</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I 
see</strong></del></span> <span class="inserted"><ins><em>Apple
+    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;).</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;.</em></ins></span> 
The <span class="removed"><del><strong>company says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span> 
to <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="inserted"><ins><em>client program is nonfree, and</em></ins></span> data 
<span class="inserted"><ins><em>processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell</em></ins></span> you <span class="inserted"><ins><em>how and where 
it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
+    tell you how</em></ins></span> and <span class="removed"><del><strong>hand 
it over,</strong></del></span> <span class="inserted"><ins><em>where it's 
done&rdquo;), users have no way
+    to know what happens to</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>recordings 
unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201902080"&gt;
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
-    paid for.&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt; to</em></ins></span> make sure 
<span class="removed"><del><strong>to place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>the user is still
+    paying for the subscription, and hasn't printed more pages 
than</em></ins></span> were <span class="removed"><del><strong>programmed to 
spy</strong></del></span>
+    <span class="inserted"><ins><em>paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
-    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>use of ink cartridges</em></ins></span> that 
<span class="removed"><del><strong>was
-before</strong></del></span> <span class="inserted"><ins><em>would otherwise 
be in
+    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
+    restrictions</em></ins></span> in <span class="removed"><del><strong>TV 
Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of 
an</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>security of 
an</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>device,
@@ -3157,7 +3166,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 13:29:58 $
+$Date: 2019/09/10 11:33:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- proprietary-surveillance.ja.po      7 Sep 2019 13:29:58 -0000       1.301
+++ proprietary-surveillance.ja.po      10 Sep 2019 11:33:42 -0000      1.302
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1417,6 +1417,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -b -r1.241 -r1.242
--- proprietary-surveillance.pot        7 Sep 2019 13:29:58 -0000       1.241
+++ proprietary-surveillance.pot        10 Sep 2019 11:33:42 -0000      1.242
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1036,6 +1036,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a "
+"href=\"https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/\";>
 "
+"A US prosecutor has demanded the list of all the 10,000 or more people who "
+"have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a "
 
"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\";>
 "
 "bypass user's settings</a>, regulations, and privacy-enhancing features of "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.561
retrieving revision 1.562
diff -u -b -r1.561 -r1.562
--- proprietary-surveillance.ru.po      9 Sep 2019 07:31:44 -0000       1.561
+++ proprietary-surveillance.ru.po      10 Sep 2019 11:33:42 -0000      1.562
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1462,6 +1463,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary.de-diff.html    7 Sep 2019 07:31:39 -0000       1.117
+++ proprietary.de-diff.html    10 Sep 2019 11:33:42 -0000      1.118
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,19 +101,19 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -163,10 +163,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -188,6 +188,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908300"&gt;
     &lt;p&gt;In spite of iPhone's reputation for being
     secure, it does have bad security flaws. Crackers
@@ -225,14 +237,6 @@
 
     &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908150"&gt;
-    &lt;p&gt;Apple is putting DRM on iPhone
-    batteries, and the system proprietary software &lt;a
-    
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"&gt;turns
-    off certain features when batteries are replaced other than by
-    Apple.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -293,7 +297,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary.de.po   7 Sep 2019 07:31:39 -0000       1.159
+++ proprietary.de.po   10 Sep 2019 11:33:42 -0000      1.160
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -455,6 +455,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -499,14 +513,6 @@
 msgid "That almost certainly means it can do so."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary.es.po   7 Sep 2019 22:28:49 -0000       1.206
+++ proprietary.es.po   10 Sep 2019 11:33:42 -0000      1.207
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2\n"
 
@@ -312,6 +313,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -381,19 +396,6 @@
 msgid "That almost certainly means it can do so."
 msgstr "Casi seguro eso quiere decir que puede hacerlo."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-"Apple está poniendo DRM en las baterías de los iPhone, y el software "
-"privativo del sistema <a href=\"https://www.vice.com/en_us/article/59nz3k/";
-"apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"
-"\">desactiva ciertas funcionalidades cuando las baterías se sustituyen por "
-"otras que no sean de Apple</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -471,3 +473,15 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
+#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
+#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
+#~ "off certain features when batteries are replaced other than by Apple.</a>"
+#~ msgstr ""
+#~ "Apple está poniendo DRM en las baterías de los iPhone, y el software "
+#~ "privativo del sistema <a href=\"https://www.vice.com/en_us/article/59nz3k/";
+#~ "apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"
+#~ "\">desactiva ciertas funcionalidades cuando las baterías se sustituyen "
+#~ "por otras que no sean de Apple</a>."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.250
retrieving revision 1.251
diff -u -b -r1.250 -r1.251
--- proprietary.fr.po   7 Sep 2019 13:56:54 -0000       1.250
+++ proprietary.fr.po   10 Sep 2019 11:33:42 -0000      1.251
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2019-09-04 16:03+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -308,6 +309,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -375,19 +390,6 @@
 msgid "That almost certainly means it can do so."
 msgstr "Cela signifie sûrement qu'il en a la possibilité."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-"Il y a un DRM dans les batteries de l'iPhone et le système d'exploitation "
-"privateur d'Apple <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-";
-"is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"
-"\">désactive certaines fonctionnalités quand les batteries sont remplacées 
"
-"par des tiers</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -461,3 +463,15 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
+#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
+#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
+#~ "off certain features when batteries are replaced other than by Apple.</a>"
+#~ msgstr ""
+#~ "Il y a un DRM dans les batteries de l'iPhone et le système d'exploitation 
"
+#~ "privateur d'Apple <a href=\"https://www.vice.com/en_us/article/59nz3k/";
+#~ "apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"
+#~ "\">désactive certaines fonctionnalités quand les batteries sont "
+#~ "remplacées par des tiers</a>."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary.it-diff.html    7 Sep 2019 07:31:39 -0000       1.129
+++ proprietary.it-diff.html    10 Sep 2019 11:33:42 -0000      1.130
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -162,10 +162,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -187,6 +187,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908300"&gt;
     &lt;p&gt;In spite of iPhone's reputation for being
     secure, it does have bad security flaws. Crackers
@@ -224,14 +236,6 @@
 
     &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908150"&gt;
-    &lt;p&gt;Apple is putting DRM on iPhone
-    batteries, and the system proprietary software &lt;a
-    
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"&gt;turns
-    off certain features when batteries are replaced other than by
-    Apple.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -292,7 +296,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary.it.po   7 Sep 2019 07:31:39 -0000       1.168
+++ proprietary.it.po   10 Sep 2019 11:33:43 -0000      1.169
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -459,6 +459,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -503,14 +517,6 @@
 msgid "That almost certainly means it can do so."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary.ja-diff.html    7 Sep 2019 07:31:39 -0000       1.132
+++ proprietary.ja-diff.html    10 Sep 2019 11:33:43 -0000      1.133
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -123,8 +123,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a
 href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;
 to
-servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
+servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
@@ -132,8 +132,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
@@ -185,6 +185,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908300"&gt;
     &lt;p&gt;In spite of iPhone's reputation for being
     secure, it does have bad security flaws. Crackers
@@ -222,14 +234,6 @@
 
     &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908150"&gt;
-    &lt;p&gt;Apple is putting DRM on iPhone
-    batteries, and the system proprietary software &lt;a
-    
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"&gt;turns
-    off certain features when batteries are replaced other than by
-    Apple.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -290,7 +294,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.ja.po   7 Sep 2019 07:31:39 -0000       1.152
+++ proprietary.ja.po   10 Sep 2019 11:33:43 -0000      1.153
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -319,6 +319,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -363,14 +377,6 @@
 msgid "That almost certainly means it can do so."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.nl-diff.html    7 Sep 2019 07:31:39 -0000       1.130
+++ proprietary.nl-diff.html    10 Sep 2019 11:33:43 -0000      1.131
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -162,10 +162,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -187,6 +187,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908300"&gt;
     &lt;p&gt;In spite of iPhone's reputation for being
     secure, it does have bad security flaws. Crackers
@@ -224,14 +236,6 @@
 
     &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908150"&gt;
-    &lt;p&gt;Apple is putting DRM on iPhone
-    batteries, and the system proprietary software &lt;a
-    
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"&gt;turns
-    off certain features when batteries are replaced other than by
-    Apple.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -292,7 +296,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary.nl.po   7 Sep 2019 07:31:39 -0000       1.142
+++ proprietary.nl.po   10 Sep 2019 11:33:43 -0000      1.143
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -361,6 +361,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -405,14 +419,6 @@
 msgid "That almost certainly means it can do so."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary.pl-diff.html    7 Sep 2019 07:31:39 -0000       1.147
+++ proprietary.pl-diff.html    10 Sep 2019 11:33:43 -0000      1.148
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>April, 2019, the pages in this directory list 
around 400
-instances of malicious functionalities (with more than 450 references to
+&lt;p&gt;As of April, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 450 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -130,10 +130,10 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -161,10 +161,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -185,6 +185,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908300"&gt;
     &lt;p&gt;In spite of iPhone's reputation for being
     secure, it does have bad security flaws. Crackers
@@ -222,14 +234,6 @@
 
     &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908150"&gt;
-    &lt;p&gt;Apple is putting DRM on iPhone
-    batteries, and the system proprietary software &lt;a
-    
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"&gt;turns
-    off certain features when batteries are replaced other than by
-    Apple.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -290,7 +294,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary.pl.po   7 Sep 2019 07:31:39 -0000       1.135
+++ proprietary.pl.po   10 Sep 2019 11:33:43 -0000      1.136
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -540,6 +540,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -584,14 +598,6 @@
 msgid "That almost certainly means it can do so."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary.pot     7 Sep 2019 07:31:39 -0000       1.132
+++ proprietary.pot     10 Sep 2019 11:33:43 -0000      1.133
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -257,6 +257,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a "
+"href=\"https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/\";>
 "
+"A US prosecutor has demanded the list of all the 10,000 or more people who "
+"have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a "
 
"href=\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says\";>
 "
@@ -299,14 +313,6 @@
 msgid "That almost certainly means it can do so."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a "
-"href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\";>turns
 "
-"off certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- proprietary.pt-br.po        10 Sep 2019 10:01:21 -0000      1.211
+++ proprietary.pt-br.po        10 Sep 2019 11:33:43 -0000      1.212
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2019-09-09 22:19-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -305,6 +306,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -372,19 +387,6 @@
 msgid "That almost certainly means it can do so."
 msgstr "Isso quase com certeza significa que ele pode fazê-lo."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-"A Apple está inserindo DRM em baterias do iPhone e o software de sistema "
-"proprietário <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">desliga "
-"certos recursos quando as baterias são substituídas por outra além da 
Apple."
-"</a>"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -460,6 +462,18 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
+#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
+#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
+#~ "off certain features when batteries are replaced other than by Apple.</a>"
+#~ msgstr ""
+#~ "A Apple está inserindo DRM em baterias do iPhone e o software de sistema "
+#~ "proprietário <a 
href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
+#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"
+#~ "\">desliga certos recursos quando as baterias são substituídas por outra 
"
+#~ "além da Apple.</a>"
+
+#~ msgid ""
 #~ "Out of 21 gratis Android antivirus apps that were tested by security "
 #~ "researchers, eight <a href=\"https://www.comparitech.com/antivirus/";
 #~ "android-antivirus-vulnerabilities/\"> failed to detect a test virus</a>. "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary.ru.po   9 Sep 2019 07:31:44 -0000       1.284
+++ proprietary.ru.po   10 Sep 2019 11:33:43 -0000      1.285
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -311,6 +312,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -380,19 +395,6 @@
 msgid "That almost certainly means it can do so."
 msgstr "Это почти наверняка означает, что 
может."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-"Apple закладывает цифровое управление 
ограничениями в аккумуляторы iPhone, и "
-"несвободные системные программы <a 
href=\"https://www.vice.com/en_us/";
-"article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-"
-"for-diy-repair\">выключают определенные функции, 
когда аккумуляторы "
-"заменяются кем-то, кроме Apple.</a>"
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -472,6 +474,18 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
+#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
+#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
+#~ "off certain features when batteries are replaced other than by Apple.</a>"
+#~ msgstr ""
+#~ "Apple закладывает цифровое управление 
ограничениями в аккумуляторы "
+#~ "iPhone, и несвободные системные программы <a 
href=\"https://www.vice.com/";
+#~ "en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-"
+#~ "nightmare-for-diy-repair\">выключают определенные 
функции, когда "
+#~ "аккумуляторы заменяются кем-то, кроме 
Apple.</a>"
+
+#~ msgid ""
 #~ "Out of 21 gratis Android antivirus apps that were tested by security "
 #~ "researchers, eight <a href=\"https://www.comparitech.com/antivirus/";
 #~ "android-antivirus-vulnerabilities/\"> failed to detect a test virus</a>. "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.zh-tw-diff.html 7 Sep 2019 07:31:39 -0000       1.109
+++ proprietary.zh-tw-diff.html 10 Sep 2019 11:33:43 -0000      1.110
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,19 +101,19 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -163,10 +163,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -188,6 +188,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908300"&gt;
     &lt;p&gt;In spite of iPhone's reputation for being
     secure, it does have bad security flaws. Crackers
@@ -225,14 +237,6 @@
 
     &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908150"&gt;
-    &lt;p&gt;Apple is putting DRM on iPhone
-    batteries, and the system proprietary software &lt;a
-    
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"&gt;turns
-    off certain features when batteries are replaced other than by
-    Apple.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -293,7 +297,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary.zh-tw.po        7 Sep 2019 07:31:39 -0000       1.120
+++ proprietary.zh-tw.po        10 Sep 2019 11:33:43 -0000      1.121
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -433,6 +433,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -477,14 +491,6 @@
 msgid "That almost certainly means it can do so."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- pt-br.po    10 Sep 2019 10:01:21 -0000      1.171
+++ pt-br.po    10 Sep 2019 11:33:43 -0000      1.172
@@ -5198,6 +5198,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- ru.po       9 Sep 2019 07:59:27 -0000       1.284
+++ ru.po       10 Sep 2019 11:33:43 -0000      1.285
@@ -6659,6 +6659,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- zh-tw.po    7 Sep 2019 16:29:27 -0000       1.133
+++ zh-tw.po    10 Sep 2019 11:33:43 -0000      1.134
@@ -4664,6 +4664,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance.  There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
 "\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-";
 "even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]