www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Tue, 10 Sep 2019 19:59:31 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/09/10 19:59:31

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.ru.po nl.po 
                         pl.po pot proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.134&r2=1.135

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- de.po       10 Sep 2019 11:33:42 -0000      1.134
+++ de.po       10 Sep 2019 23:59:29 -0000      1.135
@@ -1088,6 +1088,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- es.po       10 Sep 2019 11:33:42 -0000      1.184
+++ es.po       10 Sep 2019 23:59:29 -0000      1.185
@@ -997,6 +997,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- fr.po       10 Sep 2019 12:40:46 -0000      1.233
+++ fr.po       10 Sep 2019 23:59:30 -0000      1.234
@@ -953,6 +953,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- it.po       10 Sep 2019 11:33:42 -0000      1.134
+++ it.po       10 Sep 2019 23:59:30 -0000      1.135
@@ -1010,6 +1010,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- ja.po       10 Sep 2019 11:33:42 -0000      1.141
+++ ja.po       10 Sep 2019 23:59:30 -0000      1.142
@@ -853,6 +853,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-apple.de-diff.html  7 Sep 2019 07:31:38 -0000       1.42
+++ malware-apple.de-diff.html  10 Sep 2019 23:59:30 -0000      1.43
@@ -318,25 +318,37 @@
   &lt;li&gt;
     &lt;p&gt;Apple &lt;a
 
href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-stops users from fixing</strong></del></span> <span 
class="inserted"><ins><em>refute</em></ins></span> the
+stops users from fixing</strong></del></span> <span 
class="inserted"><ins><em>refute</em></ins></span> the <span 
class="removed"><del><strong>security bugs</strong></del></span>
   <span class="inserted"><ins><em>supposition that prestigious proprietary 
software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201908300"&gt;
-    &lt;p&gt;In spite of iPhone's reputation for being
-    secure, it does have bad</em></ins></span> security <span 
class="inserted"><ins><em>flaws. Crackers
-    exploited 14</em></ins></span> bugs <span class="removed"><del><strong>in 
Quicktime</strong></del></span> <span class="inserted"><ins><em>of 
iOS</em></ins></span> for
-      <span class="removed"><del><strong>Windows&lt;/a&gt;, while 
refusing</strong></del></span> <span class="inserted"><ins><em>two and a half 
years</em></ins></span> to <span class="removed"><del><strong>fix them 
itself.&lt;/p&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found</em></ins></span>
+    in <span class="removed"><del><strong>Quicktime</strong></del></span> 
<span class="inserted"><ins><em>iOS allowed attackers to gain access to 
sensitive information
+    including private messages, passwords, photos, contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on 
Apple</em></ins></span>
+    for
+      <span class="removed"><del><strong>Windows&lt;/a&gt;, while 
refusing</strong></del></span> <span class="inserted"><ins><em>even a modicum 
of security.  It also means that the devices do
+    not even try</em></ins></span> to <span class="removed"><del><strong>fix 
them</strong></del></span> <span class="inserted"><ins><em>offer security 
against Apple</em></ins></span> itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;iOS version 9 for
-    iThings</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;iOS version 9</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908300"&gt;
+    &lt;p&gt;In spite of iPhone's reputation</em></ins></span> for
+    <span class="removed"><del><strong>iThings &lt;a 
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
     Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from the users. However, it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says"&gt;
+    criticism from the users. However,</strong></del></span> <span 
class="inserted"><ins><em>being
+    secure,</em></ins></span> it <span class="inserted"><ins><em>does have bad 
security flaws. Crackers
+    exploited 14 bugs of iOS for two and a half years to &lt;a
+    
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says"&gt;
     steal users' most private data&lt;/a&gt;, and gain access to their
     accounts.&lt;/p&gt;
 
@@ -442,84 +454,87 @@
       <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>operating system</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
       &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>the 
Apple iThings,</em></ins></span> is <span class="removed"><del><strong>a way to 
&lt;a href="https://support.apple.com/en-us/HT201104"&gt;
+    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>the 
Apple iThings,</em></ins></span> is <span class="inserted"><ins><em>the 
prototype
+of</em></ins></span> a <span class="removed"><del><strong>way 
to</strong></del></span> <span class="inserted"><ins><em>jail&lt;/a&gt;.  It 
was Apple that introduced the practice of
+designing general purpose computers with censorship of application
+programs.&lt;/p&gt;
+
+&lt;p&gt;Here is an article about the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
       deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
       surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>the prototype</em></ins></span>
-of <span class="removed"><del><strong>this to
+    &lt;p&gt;Unknown people apparently took advantage of this to
       &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span> <span class="inserted"><ins><em>a 
jail&lt;/a&gt;.  It was Apple that introduced the practice</em></ins></span> of 
<span class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to 
break Apple's
-      security to get at them, but NSA can access any</strong></del></span>
-<span class="inserted"><ins><em>designing general purpose computers with 
censorship</em></ins></span> of <span class="removed"><del><strong>them 
through</strong></del></span> <span class="inserted"><ins><em>application
-programs.&lt;/p&gt;
+      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+code signing&lt;/a&gt; that the iThings use</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>lock up 
the user.&lt;/p&gt;
 
-&lt;p&gt;Here is an article about the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+&lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any of 
them</strong></del></span> <span class="inserted"><ins><em>allow limited 
passage</em></ins></span> through
+      <span class="removed"><del><strong>&lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
-  MacOS automatically sends</strong></del></span>
-<span 
class="inserted"><ins><em>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-code signing&lt;/a&gt; that the iThings use</em></ins></span> to <span 
class="inserted"><ins><em>lock up the user.&lt;/p&gt;
-
-&lt;p&gt;Curiously,</em></ins></span> Apple <span 
class="removed"><del><strong>servers unsaved documents being
-  edited&lt;/a&gt;. The</strong></del></span> <span 
class="inserted"><ins><em>is beginning to allow limited passage through the
+  MacOS automatically sends</strong></del></span> <span 
class="inserted"><ins><em>the
 walls of the iThing jail: users can now install apps built from
 source code, provided the source code is written in Swift.  Users
-cannot do this freely because they are required to identify
+cannot do this freely because they are required</em></ins></span> to <span 
class="removed"><del><strong>Apple servers unsaved documents being
+  edited&lt;/a&gt;. The</strong></del></span> <span 
class="inserted"><ins><em>identify
 themselves.</em></ins></span> &lt;a
   <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
   things you have</strong></del></span> <span 
class="inserted"><ins><em>href="https://developer.apple.com/xcode/"&gt;Here
 are details&lt;/a&gt;. While this is a crack in the prison walls, it 
is</em></ins></span> not <span 
class="removed"><del><strong>decided</strong></del></span>
-<span class="inserted"><ins><em>big enough</em></ins></span> to <span 
class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>mean that the iThings are no longer jails.&lt;/p&gt;
+<span class="inserted"><ins><em>big enough</em></ins></span> to <span 
class="removed"><del><strong>save are even more sensitive 
than</strong></del></span> <span class="inserted"><ins><em>mean 
that</em></ins></span> the
+  <span class="removed"><del><strong>things you have 
stored</strong></del></span> <span class="inserted"><ins><em>iThings are no 
longer jails.&lt;/p&gt;
 
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught in the jail of an iMonster</em></ins></span> are 
<span class="inserted"><ins><em>&lt;a
-    href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
+    &lt;p&gt;Users caught</em></ins></span> in <span 
class="removed"><del><strong>files&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple has made various</strong></del></span> <span 
class="inserted"><ins><em>the jail of an iMonster are</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html"&gt;
 sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable</em></ins></span> even <span class="removed"><del><strong>more 
sensitive than</strong></del></span> <span class="inserted"><ins><em>if it 
didn't lead to security threats as well.&lt;/p&gt;
+    inexcusable even if it didn't lead</em></ins></span> to <span 
class="inserted"><ins><em>security threats as well.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710130"&gt;
     &lt;p&gt;Apple is &lt;a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
-    censoring apps for</em></ins></span> the
-  <span class="removed"><del><strong>things you have 
stored</strong></del></span> <span class="inserted"><ins><em>US government 
too&lt;/a&gt;. Specifically, it is
+    censoring apps for the US government too&lt;/a&gt;. Specifically, it is
     deleting apps developed by Iranians.&lt;/p&gt;
 
-    &lt;p&gt;The root of these wrongs are</em></ins></span> in <span 
class="removed"><del><strong>files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Apple. If Apple had not designed
-    the iMonsters to let Apple censor applications, Apple would not have
-    had the power to stop users from installing whatever kind of 
apps.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;The root of these wrongs are in Apple. If</em></ins></span> Apple 
<span class="removed"><del><strong>servers without asking permission&lt;/a&gt;.
+  This exposes</strong></del></span> <span class="inserted"><ins><em>had not 
designed</em></ins></span>
+    the <span class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>iMonsters</em></ins></span> to <span 
class="removed"><del><strong>Big Brother and perhaps</strong></del></span> 
<span class="inserted"><ins><em>let Apple censor applications, Apple would not 
have
+    had the power</em></ins></span> to <span 
class="removed"><del><strong>other snoops.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple has made 
various</strong></del></span>
+  &lt;p&gt;It also demonstrates how you can't trust proprietary software,
+  because</strong></del></span> <span class="inserted"><ins><em>stop users 
from installing whatever kind of apps.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201707290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
-  MacOS programs send files</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
+  &lt;li id="M201707290"&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
     deleted several VPNs from its app store for China&lt;/a&gt;, thus using its
-    own censorship power</em></ins></span> to <span 
class="removed"><del><strong>Apple servers without asking permission&lt;/a&gt;.
-  This exposes</strong></del></span> <span 
class="inserted"><ins><em>strengthen that of</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>Chinese government.&lt;/p&gt;
+    own censorship power to strengthen that of the Chinese 
government.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship system</em></ins></span> to <span 
class="removed"><del><strong>Big Brother</strong></del></span> <span 
class="inserted"><ins><em>enforce Russian surveillance &lt;a
+    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
     
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
     by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
     While subjecting its users to its own surveillance, it tries to
-    protect its users from Russian surveillance,</em></ins></span> and <span 
class="removed"><del><strong>perhaps</strong></del></span> <span 
class="inserted"><ins><em>is therefore subject</em></ins></span>
-    to <span class="removed"><del><strong>other snoops.&lt;/p&gt;
-
-  &lt;p&gt;It also demonstrates how you can't trust proprietary 
software,</strong></del></span> <span class="inserted"><ins><em>Russian 
censorship.&lt;/p&gt;
+    protect its users from Russian surveillance, and is therefore subject
+    to Russian censorship.&lt;/p&gt;
 
     &lt;p&gt;However, the point here is the wrong of Apple's censorship of
     apps.&lt;/p&gt;
@@ -541,7 +556,7 @@
 
   &lt;li id="M201509290"&gt;
     &lt;p&gt;Apple &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
-    banned a program from the App Store&lt;/a&gt;</em></ins></span> because 
<span class="inserted"><ins><em>its developers
+    banned a program from the App Store&lt;/a&gt; because its developers
     committed the enormity of disassembling some iThings.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1230,7 +1245,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:38 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- malware-apple.de.po 7 Sep 2019 07:31:38 -0000       1.137
+++ malware-apple.de.po 10 Sep 2019 23:59:30 -0000      1.138
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -444,6 +444,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- malware-apple.es.po 7 Sep 2019 22:28:49 -0000       1.152
+++ malware-apple.es.po 10 Sep 2019 23:59:30 -0000      1.153
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
 "X-Generator: Poedit 2.2\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -397,6 +398,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- malware-apple.fr.po 7 Sep 2019 11:59:39 -0000       1.158
+++ malware-apple.fr.po 10 Sep 2019 23:59:30 -0000      1.159
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2019-08-25 21:05+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -396,6 +397,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- malware-apple.it-diff.html  7 Sep 2019 07:31:38 -0000       1.50
+++ malware-apple.it-diff.html  10 Sep 2019 23:59:30 -0000      1.51
@@ -266,6 +266,19 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos, contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908300"&gt;
     &lt;p&gt;In spite of iPhone's reputation for being
     secure, it does have bad security flaws. Crackers
@@ -391,8 +404,7 @@
     apps.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Apple</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201701050"&gt;
     &lt;p&gt;Apple used its censorship system to enforce China's censorship 
&lt;a
@@ -437,7 +449,7 @@
     not be allowed to censor apps.  Even if Apple carried out this act of
     censorship with some care, it would still be wrong.  Whether racism
     is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not have the power to impose its views
+    the real issue.</em></ins></span>  Apple <span 
class="inserted"><ins><em>should not have the power to impose its views
     about either of these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1098,7 +1110,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:38 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- malware-apple.it.po 7 Sep 2019 07:31:38 -0000       1.131
+++ malware-apple.it.po 10 Sep 2019 23:59:30 -0000      1.132
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -409,6 +409,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-apple.ja-diff.html  7 Sep 2019 07:31:38 -0000       1.63
+++ malware-apple.ja-diff.html  10 Sep 2019 23:59:30 -0000      1.64
@@ -269,6 +269,19 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos, contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908300"&gt;
     &lt;p&gt;In spite of iPhone's reputation for being
     secure, it does have bad security flaws. Crackers
@@ -537,19 +550,19 @@
 
 &lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;The wrongs in this 
section</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;The wrongs</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;p&gt;These</em></ins></span> are <span 
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way that hurts the user.
-But they are a lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> Apple
-<span class="removed"><del><strong>actions</strong></del></span> <span 
class="inserted"><ins><em>employs its power over users
-to directly intervene in ways</em></ins></span> that harm <span 
class="inserted"><ins><em>them or block their work.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;p&gt;These are situations in which Apple 
employs its power over users
+to directly intervene</em></ins></span> in <span 
class="removed"><del><strong>this section are not precisely malware, since they 
do
+not involve making the program</strong></del></span> <span 
class="inserted"><ins><em>ways</em></ins></span> that <span 
class="removed"><del><strong>runs in</strong></del></span> <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When Apple suspects a user of fraud, it
-    judges the case secretly and presents the verdict
-    as a fait accompli.  The punishment</em></ins></span> to <span 
class="inserted"><ins><em>a user found guilty &lt;a
+    &lt;p&gt;When Apple suspects</em></ins></span> a <span 
class="removed"><del><strong>way that hurts</strong></del></span> <span 
class="inserted"><ins><em>user of fraud, it
+    judges</em></ins></span> the <span class="removed"><del><strong>user.
+But they are</strong></del></span> <span class="inserted"><ins><em>case 
secretly and presents the verdict
+    as</em></ins></span> a <span class="removed"><del><strong>lot like 
malware, since they are technical Apple
+actions that harm</strong></del></span> <span class="inserted"><ins><em>fait 
accompli.  The punishment</em></ins></span> to <span 
class="inserted"><ins><em>a user found guilty &lt;a
     
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
     being cut off for life, which more-or-less cripples</em></ins></span> the 
<span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>user's Apple
     devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
@@ -575,13 +588,13 @@
 
     &lt;p&gt;The <span class="removed"><del><strong>Apple 
Music</strong></del></span> <span 
class="inserted"><ins><em>Telegram</em></ins></span> client
       <span class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>is free software on other platforms, but not on
-    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    iThings. Since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
     are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
+    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
     changes</em></ins></span> the <span 
class="removed"><del><strong>user's</strong></del></span> file system <span 
class="inserted"><ins><em>from HFS+  to APFS&lt;/a&gt;, which cannot be
     accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
@@ -629,11 +642,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201602050"&gt;</em></ins></span>
-    &lt;p&gt;iOS version 9 for iThings &lt;a
-    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    &lt;p&gt;iOS version 9 for iThings &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if they were repaired by someone other than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple <span class="removed"><del><strong>eventually 
backed off from this policy under
-    criticism</strong></del></span> <span class="inserted"><ins><em>eventually 
backed off from this policy under
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
     criticism from the users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
@@ -697,8 +712,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201809070"&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
-    
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -727,8 +742,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -1059,7 +1074,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:38 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- malware-apple.ja.po 7 Sep 2019 07:31:38 -0000       1.114
+++ malware-apple.ja.po 10 Sep 2019 23:59:30 -0000      1.115
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- malware-apple.nl-diff.html  7 Sep 2019 07:31:38 -0000       1.68
+++ malware-apple.nl-diff.html  10 Sep 2019 23:59:30 -0000      1.69
@@ -269,6 +269,19 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos, contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908300"&gt;
     &lt;p&gt;In spite of iPhone's reputation for being
     secure, it does have bad security flaws. Crackers
@@ -537,19 +550,19 @@
 
 &lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;The wrongs in this 
section</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;The wrongs</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;p&gt;These</em></ins></span> are <span 
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way that hurts the user.
-But they are a lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> Apple
-<span class="removed"><del><strong>actions</strong></del></span> <span 
class="inserted"><ins><em>employs its power over users
-to directly intervene in ways</em></ins></span> that harm <span 
class="inserted"><ins><em>them or block their work.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;p&gt;These are situations in which Apple 
employs its power over users
+to directly intervene</em></ins></span> in <span 
class="removed"><del><strong>this section are not precisely malware, since they 
do
+not involve making the program</strong></del></span> <span 
class="inserted"><ins><em>ways</em></ins></span> that <span 
class="removed"><del><strong>runs in</strong></del></span> <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When Apple suspects a user of fraud, it
-    judges the case secretly and presents the verdict
-    as a fait accompli.  The punishment</em></ins></span> to <span 
class="inserted"><ins><em>a user found guilty &lt;a
+    &lt;p&gt;When Apple suspects</em></ins></span> a <span 
class="removed"><del><strong>way that hurts</strong></del></span> <span 
class="inserted"><ins><em>user of fraud, it
+    judges</em></ins></span> the <span class="removed"><del><strong>user.
+But they are</strong></del></span> <span class="inserted"><ins><em>case 
secretly and presents the verdict
+    as</em></ins></span> a <span class="removed"><del><strong>lot like 
malware, since they are technical Apple
+actions that harm</strong></del></span> <span class="inserted"><ins><em>fait 
accompli.  The punishment</em></ins></span> to <span 
class="inserted"><ins><em>a user found guilty &lt;a
     
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
     being cut off for life, which more-or-less cripples</em></ins></span> the 
<span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>user's Apple
     devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
@@ -575,13 +588,13 @@
 
     &lt;p&gt;The <span class="removed"><del><strong>Apple 
Music</strong></del></span> <span 
class="inserted"><ins><em>Telegram</em></ins></span> client
       <span class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>is free software on other platforms, but not on
-    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    iThings. Since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
     are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
+    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
     changes</em></ins></span> the <span 
class="removed"><del><strong>user's</strong></del></span> file system <span 
class="inserted"><ins><em>from HFS+  to APFS&lt;/a&gt;, which cannot be
     accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
@@ -629,11 +642,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201602050"&gt;</em></ins></span>
-    &lt;p&gt;iOS version 9 for iThings &lt;a
-    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    &lt;p&gt;iOS version 9 for iThings &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if they were repaired by someone other than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple <span class="removed"><del><strong>eventually 
backed off from this policy under
-    criticism</strong></del></span> <span class="inserted"><ins><em>eventually 
backed off from this policy under
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
     criticism from the users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
@@ -697,8 +712,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201809070"&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
-    
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -727,8 +742,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -1059,7 +1074,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:38 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- malware-apple.nl.po 7 Sep 2019 07:31:39 -0000       1.69
+++ malware-apple.nl.po 10 Sep 2019 23:59:30 -0000      1.70
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -350,6 +350,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-apple.pot   7 Sep 2019 07:31:39 -0000       1.79
+++ malware-apple.pot   10 Sep 2019 23:59:30 -0000      1.80
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -292,6 +292,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a "
+"href=\"https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/\";>found
 "
+"in iOS allowed attackers to gain access to sensitive information including "
+"private messages, passwords, photos, contacts stored on the user's "
+"iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a "
 
"href=\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says\";>
 "

Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- malware-apple.ru.po 9 Sep 2019 07:31:44 -0000       1.212
+++ malware-apple.ru.po 10 Sep 2019 23:59:30 -0000      1.213
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2019-01-29 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -392,6 +393,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- nl.po       10 Sep 2019 11:33:42 -0000      1.135
+++ nl.po       10 Sep 2019 23:59:30 -0000      1.136
@@ -873,6 +873,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- pl.po       10 Sep 2019 11:33:42 -0000      1.134
+++ pl.po       10 Sep 2019 23:59:30 -0000      1.135
@@ -818,6 +818,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- pot 10 Sep 2019 11:33:42 -0000      1.133
+++ pot 10 Sep 2019 23:59:30 -0000      1.134
@@ -675,6 +675,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-insecurity.de-diff.html 7 Sep 2019 07:31:39 -0000       1.30
+++ proprietary-insecurity.de-diff.html 10 Sep 2019 23:59:30 -0000      1.31
@@ -68,16 +68,29 @@
 &lt;ul&gt;
 &lt;li&gt;
   &lt;p&gt;Some Samsung phones
-    randomly &lt;a 
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;One of the dangers of the &ldquo;internet</strong></del></span> 
<span class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
+    randomly</strong></del></span> <span class="inserted"><ins><em>serve as 
specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
+    photos to people</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found</em></ins></span>
+    in <span class="inserted"><ins><em>iOS allowed attackers to gain access to 
sensitive information
+    including private messages, passwords, photos, contacts stored 
on</em></ins></span>
+    the <span class="removed"><del><strong>owner's contact 
list&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;One</strong></del></span> <span class="inserted"><ins><em>user's 
iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity</em></ins></span> of <span 
class="removed"><del><strong>the dangers</strong></del></span> <span 
class="inserted"><ins><em>iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum</em></ins></span> of <span 
class="inserted"><ins><em>security.  It also means that</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;internet</strong></del></span> <span 
class="inserted"><ins><em>devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908300"&gt;
     &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>stings&rdquo; is that, if
     you lose your internet service, you also &lt;a
@@ -94,48 +107,46 @@
     allow delivery staff</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says"&gt;
     steal users' most private data&lt;/a&gt;, and gain 
access</em></ins></span> to <span 
class="removed"><del><strong>open</strong></del></span> their <span 
class="removed"><del><strong>front doors&lt;/a&gt;. Wouldn't you know it,
-    the system</strong></del></span>
+    the system has a grave security flaw.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Intel's intentional &ldquo;management engine&rdquo; back 
door</strong></del></span>
     <span class="inserted"><ins><em>accounts.&lt;/p&gt;
 
-    &lt;p&gt;Apple</em></ins></span> has <span class="removed"><del><strong>a 
grave</strong></del></span> <span class="inserted"><ins><em>corrected these 
bugs, but this shows that &lt;em&gt;any&lt;/em&gt;
-    developer of nonfree programs is liable to make mistakes affecting
-    the</em></ins></span> security <span 
class="removed"><del><strong>flaw.&lt;/p&gt;
+    &lt;p&gt;Apple</em></ins></span> has <span 
class="removed"><del><strong>&lt;a
+href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/"&gt;
+    unintended back doors&lt;/a&gt; too.&lt;/p&gt;
 &lt;/li&gt;
 &lt;li&gt;
-  &lt;p&gt;Intel's intentional &ldquo;management engine&rdquo; back door has 
&lt;a
-href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/"&gt;
-    unintended back doors&lt;/a&gt; too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>of their products, and users can't investigate or fix
-    them.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Bad</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201908020"&gt;
-    &lt;p&gt;Out of 21 gratis Android antivirus apps
-    that were tested by</em></ins></span> security <span 
class="removed"><del><strong>in some cars makes it possible
-    to</strong></del></span> <span class="inserted"><ins><em>researchers, 
eight</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
+  &lt;p&gt;Bad security in some cars makes it possible
+    to &lt;a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
       remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 &lt;li&gt;
   &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
-    hospitals is connected</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
-    failed</em></ins></span> to <span class="inserted"><ins><em>detect a test 
virus&lt;/a&gt;. All of them asked for dangerous
-    permissions or contained advertising trackers, with seven being more
-    risky than</em></ins></span> the <span 
class="removed"><del><strong>internet. Naturally &lt;a
+    hospitals</strong></del></span> <span class="inserted"><ins><em>corrected 
these bugs, but this shows that &lt;em&gt;any&lt;/em&gt;
+    developer of nonfree programs</em></ins></span> is <span 
class="removed"><del><strong>connected</strong></del></span> <span 
class="inserted"><ins><em>liable</em></ins></span> to <span 
class="inserted"><ins><em>make mistakes affecting</em></ins></span>
+    the <span class="removed"><del><strong>internet. Naturally &lt;a
 
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
-    its security has been cracked&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>average of the 100 most popular Android 
apps.&lt;/p&gt;</em></ins></span>
+    its</strong></del></span> security <span class="removed"><del><strong>has 
been cracked&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>of their 
products, and users can't investigate or fix
+    them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908020"&gt;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps</em></ins></span>
+    that <span class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
 
-    &lt;p&gt;Note that <span class="removed"><del><strong>this article 
misuses</strong></del></span> the <span class="removed"><del><strong>term &lt;a
-href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-     referring</strong></del></span> <span class="inserted"><ins><em>article 
refers</em></ins></span> to <span 
class="removed"><del><strong>crackers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps as
+    &lt;p&gt;Note that the article refers to these proprietary apps as
     &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
-    instead.&lt;/p&gt;</em></ins></span>
+    instead.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;The bad security in</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
+  &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
@@ -251,13 +262,14 @@
     
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Note that this article misuses the term &lt;a
+    &lt;p&gt;Note that this</em></ins></span> article misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
     referring to crackers.&lt;/p&gt;
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in</em></ins></span> many Internet of Stings 
devices allows &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;</em></ins></span>
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
     to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
@@ -1060,7 +1072,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-insecurity.de.po        7 Sep 2019 07:31:39 -0000       1.133
+++ proprietary-insecurity.de.po        10 Sep 2019 23:59:30 -0000      1.134
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -139,6 +139,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-insecurity.es.po        7 Sep 2019 22:28:49 -0000       1.7
+++ proprietary-insecurity.es.po        10 Sep 2019 23:59:30 -0000      1.8
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2019-09-07 17:57-0400\n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2\n"
 
@@ -111,6 +112,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary-insecurity.fr.po        7 Sep 2019 11:59:39 -0000       1.172
+++ proprietary-insecurity.fr.po        10 Sep 2019 23:59:30 -0000      1.173
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2019-08-06 13:21+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -110,6 +111,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary-insecurity.it-diff.html 7 Sep 2019 07:31:39 -0000       1.45
+++ proprietary-insecurity.it-diff.html 10 Sep 2019 23:59:30 -0000      1.46
@@ -58,50 +58,78 @@
 &lt;li id="break-security-smarttv"&gt;
   &lt;p&gt;&lt;a
        
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-      Crackers found a way</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;This page lists clearly established 
cases of insecurity in
-proprietary software that has grave consequences or is otherwise
-noteworthy.&lt;/p&gt;
-
-&lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought</em></ins></span> to <span 
class="removed"><del><strong>break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera</strong></del></span> <span 
class="inserted"><ins><em>be in this page but isn't
-here, please write</em></ins></span>
-to <span class="removed"><del><strong>watch</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>people who are watching TV.&lt;/p&gt;
+      Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
+      to watch the people who are watching TV.&lt;/p&gt;
 &lt;/li&gt;
 &lt;li&gt;
-  &lt;p&gt;Many models</strong></del></span> <span 
class="inserted"><ins><em>URL</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras &lt;a
+  &lt;p&gt;Many models</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;This page lists clearly established 
cases</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras &lt;a
   href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
   have backdoors&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;That is</strong></del></span> a <span 
class="removed"><del><strong>malicious functionality, but in 
addition</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two
-to serve as specific substantiation.&lt;/p&gt;
+  &lt;p&gt;That is a malicious functionality, but</strong></del></span> <span 
class="inserted"><ins><em>insecurity</em></ins></span> in <span 
class="removed"><del><strong>addition it</strong></del></span>
+<span class="inserted"><ins><em>proprietary software that has grave 
consequences or</em></ins></span> is <span class="removed"><del><strong>a gross
+  insecurity since anyone, including malicious crackers, &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find those accounts and use them to get into
+  users' cameras&lt;/a&gt;.&lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;
+    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+    pre-installed on 28 models</strong></del></span> <span 
class="inserted"><ins><em>otherwise
+noteworthy.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>HP laptops logged the user's
+    keystroke</strong></del></span> <span class="inserted"><ins><em>an example 
that ought</em></ins></span> to <span class="removed"><del><strong>a 
file</strong></del></span> <span class="inserted"><ins><em>be</em></ins></span> 
in <span class="removed"><del><strong>the filesystem. Any process with 
access</strong></del></span> <span class="inserted"><ins><em>this page but isn't
+here, please write</em></ins></span>
+to <span class="inserted"><ins><em>&lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>filesystem</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference</em></ins></span> or 
<span class="removed"><del><strong>the MapViewOfFile API could gain 
access</strong></del></span> <span 
class="inserted"><ins><em>two</em></ins></span>
+to <span class="removed"><del><strong>the
+    log. Furthermore,</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201908300"&gt;
-    &lt;p&gt;In spite of iPhone's reputation for being
-    secure,</em></ins></span> it <span class="removed"><del><strong>is a gross
-  insecurity since anyone, including malicious crackers, &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find those accounts</strong></del></span> <span class="inserted"><ins><em>does 
have bad security flaws. Crackers
-    exploited 14 bugs of iOS for two</em></ins></span> and <span 
class="removed"><del><strong>use them</strong></del></span> <span 
class="inserted"><ins><em>a half years</em></ins></span> to <span 
class="removed"><del><strong>get into</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says"&gt;
-    steal</em></ins></span> users' <span 
class="removed"><del><strong>cameras&lt;/a&gt;.&lt;/p&gt;
-
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers</em></ins></span> to <span 
class="removed"><del><strong>modzero&lt;/a&gt; the &ldquo;information-leak via 
Covert Storage
+    Channel enables malware authors</strong></del></span> <span 
class="inserted"><ins><em>gain access</em></ins></span> to <span 
class="removed"><del><strong>capture keystrokes without
+    taking</strong></del></span> <span class="inserted"><ins><em>sensitive 
information
+    including private messages, passwords, photos, contacts stored 
on</em></ins></span>
+    the <span class="removed"><del><strong>risk of being classified as 
malicious task by AV
+    heuristics&rdquo;.
+  &lt;/p&gt;
 &lt;/li&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>user's 
iMonster&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-&lt;li&gt;
-  &lt;p&gt;
-    Conexant HD Audio Driver Package (version 1.0.0.46</strong></del></span> 
<span class="inserted"><ins><em>most private data&lt;/a&gt;,</em></ins></span> 
and <span class="removed"><del><strong>earlier)
-    pre-installed on 28 models</strong></del></span> <span 
class="inserted"><ins><em>gain access to their
+    &lt;p&gt;The <span class="inserted"><ins><em>deep insecurity of iMonsters 
is even more pertinent given that
+    Apple's</em></ins></span> proprietary <span 
class="removed"><del><strong>code</strong></del></span> <span 
class="inserted"><ins><em>software makes users totally dependent on Apple
+    for even a modicum of security.  It also means</em></ins></span> that 
<span class="removed"><del><strong>runs pacemakers, insulin pumps, and other
+medical</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> devices <span 
class="removed"><del><strong>is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross</strong></del></span> <span class="inserted"><ins><em>do
+    not even try to offer</em></ins></span> security <span 
class="removed"><del><strong>faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>against Apple 
itself.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Exploits</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908300"&gt;
+    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>bugs in Windows, which were developed by the 
NSA</strong></del></span> <span class="inserted"><ins><em>iPhone's reputation 
for being
+    secure, it does have bad security flaws. Crackers
+    exploited 14 bugs of iOS for two and a half years to &lt;a
+    
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says"&gt;
+    steal users' most private data&lt;/a&gt;, and gain access to their
     accounts.&lt;/p&gt;
 
     &lt;p&gt;Apple has corrected these bugs, but this shows that 
&lt;em&gt;any&lt;/em&gt;
-    developer</em></ins></span> of <span class="removed"><del><strong>HP 
laptops logged</strong></del></span> <span class="inserted"><ins><em>nonfree 
programs is liable to make mistakes affecting</em></ins></span>
-    the <span class="removed"><del><strong>user's
-    keystroke</strong></del></span> <span class="inserted"><ins><em>security 
of their products, and users can't investigate or fix
+    developer of nonfree programs is liable to make mistakes affecting
+    the security of their products, and users can't investigate or fix
     them.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -109,43 +137,37 @@
     &lt;p&gt;Out of 21 gratis Android antivirus apps
     that were tested by security researchers, eight &lt;a
     
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
-    failed</em></ins></span> to <span 
class="inserted"><ins><em>detect</em></ins></span> a <span 
class="removed"><del><strong>file in the filesystem. Any 
process</strong></del></span> <span class="inserted"><ins><em>test 
virus&lt;/a&gt;. All of them asked for dangerous
-    permissions or contained advertising trackers,</em></ins></span> with 
<span class="removed"><del><strong>access to</strong></del></span> <span 
class="inserted"><ins><em>seven being more
-    risky than</em></ins></span> the <span 
class="removed"><del><strong>filesystem or</strong></del></span> <span 
class="inserted"><ins><em>average of</em></ins></span> the <span 
class="removed"><del><strong>MapViewOfFile API could gain 
access</strong></del></span> <span class="inserted"><ins><em>100 most popular 
Android apps.&lt;/p&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
 
-    &lt;p&gt;Note that the article refers</em></ins></span> to <span 
class="inserted"><ins><em>these proprietary apps as
+    &lt;p&gt;Note that the article refers to these proprietary apps as
     &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
     instead.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when</em></ins></span> the
-    <span class="removed"><del><strong>log. Furthermore,</strong></del></span> 
<span class="inserted"><ins><em>user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to <span 
class="removed"><del><strong>modzero&lt;/a&gt; the &ldquo;information-leak via 
Covert Storage
-    Channel enables malware authors</strong></del></span> <span 
class="inserted"><ins><em>allow them access</em></ins></span> to <span 
class="removed"><del><strong>capture keystrokes without
-    taking</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught in</em></ins></span> the <span 
class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>jail</em></ins></span> of <span 
class="removed"><del><strong>being classified</strong></del></span> <span 
class="inserted"><ins><em>an iMonster are &lt;a
+    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable even if it didn't lead to security threats</em></ins></span> 
as <span class="removed"><del><strong>malicious task by AV
-    heuristics&rdquo;.
-  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;</em></ins></span>
+    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Medtronics Conexus Telemetry 
Protocol has &lt;a
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
     
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
     two vulnerabilities that affect several models of implantable
     defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
@@ -153,18 +175,18 @@
     &lt;p&gt;This protocol has been around since 2006, and similar
     vulnerabilities were discovered in an earlier Medtronics communication
     protocol in 2008. Apparently, nothing was done by the company to
-    correct them. This means you can't rely on</em></ins></span> proprietary 
<span class="removed"><del><strong>code</strong></del></span> <span 
class="inserted"><ins><em>software
+    correct them. This means you can't rely on proprietary software
     developers to fix bugs in their products.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed 
so</em></ins></span> that <span class="removed"><del><strong>runs pacemakers, 
insulin pumps,</strong></del></span> <span class="inserted"><ins><em>the
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
     that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
-    unintentional</em></ins></span> and <span class="inserted"><ins><em>I 
suppose Amazon will fix it. I
+    unintentional and I suppose Amazon will fix it. I
     do not expect Amazon to change the design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
@@ -173,8 +195,7 @@
   &lt;li id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in</em></ins></span> other
-<span class="removed"><del><strong>medical devices</strong></del></span> <span 
class="inserted"><ins><em>audio&lt;/a&gt;, so that people cannot hear
+    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
     them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -207,11 +228,10 @@
   &lt;/li&gt;
 
   &lt;li id="M201712240"&gt;
-    &lt;p&gt;One of the dangers of the &ldquo;internet of 
stings&rdquo;</em></ins></span>
-    is <span class="inserted"><ins><em>that, if you lose your internet 
service, you also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control</em></ins></span> of <span 
class="removed"><del><strong>gross</strong></del></span> <span 
class="inserted"><ins><em>your house and appliances&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;One of the dangers of the &ldquo;internet of stings&rdquo;
+    is that, if you lose your internet service, you also &lt;a
+    
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
+    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For your safety, don't use any appliance with a connection to the
     real internet.&lt;/p&gt;
@@ -227,17 +247,13 @@
     &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
     allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system has a grave</em></ins></span> security <span 
class="removed"><del><strong>faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>flaw.&lt;/p&gt;</em></ins></span>
+    it, the system has a grave security flaw.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Exploits of bugs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709290"&gt;
-    &lt;p&gt;Bad security</em></ins></span> in <span 
class="removed"><del><strong>Windows, which were developed 
by</strong></del></span> <span class="inserted"><ins><em>some cars makes it 
possible to &lt;a
+  &lt;li id="M201709290"&gt;
+    &lt;p&gt;Bad security in some cars makes it possible to &lt;a
     href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
-    remotely activate</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>airbags&lt;/a&gt;.&lt;/p&gt;
+    remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709200"&gt;
@@ -1012,7 +1028,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary-insecurity.it.po        7 Sep 2019 07:31:39 -0000       1.150
+++ proprietary-insecurity.it.po        10 Sep 2019 23:59:30 -0000      1.151
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -132,6 +132,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary-insecurity.ja-diff.html 7 Sep 2019 07:31:39 -0000       1.64
+++ proprietary-insecurity.ja-diff.html 10 Sep 2019 23:59:30 -0000      1.65
@@ -64,70 +64,104 @@
 noteworthy.&lt;/p&gt;
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought to</em></ins></span> be <span 
class="inserted"><ins><em>in this page but isn't
-here, please write
-to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;
+&lt;p&gt;If you know of an example that ought to</em></ins></span> be
+<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;
 taken
-over by third parties and used</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
+over by third parties and used for man-in-the-middle 
attacks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Due</strong></del></span> <span class="inserted"><ins><em>in this 
page but isn't
+here, please write</em></ins></span>
+to <span class="removed"><del><strong>weak security,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
+is easy</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;</em></ins></span>
+to <span class="removed"><del><strong>open</strong></del></span> <span 
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>doors</strong></del></span> <span 
class="inserted"><ins><em>URL</em></ins></span> of <span 
class="removed"><del><strong>100 million cars built by 
Volkswagen&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Ransomware &lt;a 
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has
+been developed for</strong></del></span> a <span 
class="removed"><del><strong>thermostat that uses proprietary 
software&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201908300"&gt;
-    &lt;p&gt;In spite of iPhone's reputation</em></ins></span> for <span 
class="removed"><del><strong>man-in-the-middle attacks&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201909100"&gt;</em></ins></span>
+    &lt;p&gt;A <span class="inserted"><ins><em>series of 
vulnerabilities</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found</em></ins></span>
+    in
+<span class="removed"><del><strong>Internet Explorer and Edge&lt;/a&gt; allows 
an attacker</strong></del></span> <span class="inserted"><ins><em>iOS allowed 
attackers</em></ins></span> to <span class="removed"><del><strong>retrieve
+Microsoft account credentials, if</strong></del></span> <span 
class="inserted"><ins><em>gain access to sensitive information
+    including private messages, passwords, photos, contacts stored 
on</em></ins></span>
+    the <span class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters</em></ins></span> is <span 
class="removed"><del><strong>tricked into visiting</strong></del></span> <span 
class="inserted"><ins><em>even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even</em></ins></span> a
+<span class="removed"><del><strong>malicious link.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
+WhatsApp messages are</strong></del></span> <span 
class="inserted"><ins><em>modicum of security.  It also means that the devices 
do</em></ins></span>
+    not <span class="removed"><del><strong>entirely deleted&lt;/a&gt;. They 
can be recovered
+in various ways.
+&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Due</strong></del></span> <span class="inserted"><ins><em>being
+&lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to
+&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+  malacious code from any application which uses this 
API</strong></del></span> <span class="inserted"><ins><em>even 
try</em></ins></span> to <span class="removed"><del><strong>render a
+  certain kind</strong></del></span> <span class="inserted"><ins><em>offer 
security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908300"&gt;
+    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>image file&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;A bug</strong></del></span> <span class="inserted"><ins><em>iPhone's 
reputation for being
     secure, it does have bad security flaws. Crackers
-    exploited 14 bugs of iOS for two and a half years</em></ins></span> to 
<span class="removed"><del><strong>weak security,</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says"&gt;
+    exploited 14 bugs of iOS for two and a half years to &lt;a
+    
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says"&gt;
     steal users' most private data&lt;/a&gt;, and gain access to their
     accounts.&lt;/p&gt;
 
     &lt;p&gt;Apple has corrected these bugs, but this shows that 
&lt;em&gt;any&lt;/em&gt;
-    developer of nonfree programs</em></ins></span> is <span 
class="removed"><del><strong>easy</strong></del></span> <span 
class="inserted"><ins><em>liable</em></ins></span> to <span 
class="removed"><del><strong>open</strong></del></span> <span 
class="inserted"><ins><em>make mistakes affecting</em></ins></span>
-    the <span class="removed"><del><strong>doors</strong></del></span> <span 
class="inserted"><ins><em>security</em></ins></span> of <span 
class="removed"><del><strong>100 million cars built by 
Volkswagen&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>their products, and users can't investigate or fix
-    them.&lt;/p&gt;</em></ins></span>
+    developer of nonfree programs is liable to make mistakes affecting
+    the security of their products, and users can't investigate or fix
+    them.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Ransomware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201908020"&gt;
+  &lt;li id="M201908020"&gt;
     &lt;p&gt;Out of 21 gratis Android antivirus apps
-    that were tested by security researchers, eight</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has
-been developed for</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
-    failed to detect</em></ins></span> a <span 
class="removed"><del><strong>thermostat</strong></del></span> <span 
class="inserted"><ins><em>test virus&lt;/a&gt;. All of them asked for dangerous
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
     permissions or contained advertising trackers, with seven being more
     risky than the average of the 100 most popular Android apps.&lt;/p&gt;
 
-    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>uses</strong></del></span> <span 
class="inserted"><ins><em>the article refers to these</em></ins></span> 
proprietary <span 
class="removed"><del><strong>software&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>apps as
+    &lt;p&gt;Note that the article refers to these proprietary apps as
     &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
-    instead.&lt;/p&gt;</em></ins></span>
+    instead.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;A</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
+  &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in
-<span class="removed"><del><strong>Internet Explorer and Edge&lt;/a&gt; 
allows</strong></del></span> <span class="inserted"><ins><em>Android,
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught in the jail of</em></ins></span> an <span 
class="removed"><del><strong>attacker to retrieve
-Microsoft</strong></del></span> <span class="inserted"><ins><em>iMonster are 
&lt;a
+    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
     companies from figuring out how those attacks work.&lt;/p&gt;
@@ -407,33 +441,26 @@
     &lt;p&gt;A &lt;a
     
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
     in Internet Explorer and Edge&lt;/a&gt; allows an attacker to retrieve
-    Microsoft</em></ins></span> account credentials, if the user is tricked 
into visiting
+    Microsoft account credentials, if the user is tricked into visiting
     a malicious link.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607290"&gt;</em></ins></span>
+  &lt;li id="M201607290"&gt;
     &lt;p&gt;&lt;a
     
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
     WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be recovered
-    in various <span class="removed"><del><strong>ways.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ways.&lt;/p&gt;</em></ins></span>
+    in various ways.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607220"&gt;</em></ins></span>
+  &lt;li id="M201607220"&gt;
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-  <span class="removed"><del><strong>malacious</strong></del></span>
-    <span class="inserted"><ins><em>malicious</em></ins></span> code from any 
application which uses this API to render a
+    malicious code from any application which uses this API to render a
     certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;</em></ins></span>
-    &lt;p&gt;A bug in a proprietary ASN.1 library, used
+  &lt;li id="M201607190"&gt;
+    &lt;p&gt;A bug</em></ins></span> in a proprietary ASN.1 library, used
     in cell phone towers as well as cell phones and routers, &lt;a
     
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
     taking control of those systems&lt;/a&gt;.&lt;/p&gt;
@@ -948,7 +975,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary-insecurity.ja.po        7 Sep 2019 07:31:39 -0000       1.122
+++ proprietary-insecurity.ja.po        10 Sep 2019 23:59:30 -0000      1.123
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -106,6 +106,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary-insecurity.pot  7 Sep 2019 07:31:39 -0000       1.89
+++ proprietary-insecurity.pot  10 Sep 2019 23:59:30 -0000      1.90
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a "
+"href=\"https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/\";>found
 "
+"in iOS allowed attackers to gain access to sensitive information including "
+"private messages, passwords, photos, contacts stored on the user's "
+"iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a "
 
"href=\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says\";>
 "

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary-insecurity.ru.po        9 Sep 2019 07:31:44 -0000       1.225
+++ proprietary-insecurity.ru.po        10 Sep 2019 23:59:30 -0000      1.226
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2018-12-02 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary.de-diff.html    10 Sep 2019 11:33:42 -0000      1.118
+++ proprietary.de-diff.html    10 Sep 2019 23:59:30 -0000      1.119
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,19 +101,19 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -128,12 +128,12 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -188,6 +188,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos, contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
@@ -229,14 +242,6 @@
     being cut off for life, which more-or-less cripples the user's Apple
     devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -297,7 +302,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/10 11:33:42 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary.de.po   10 Sep 2019 11:33:42 -0000      1.160
+++ proprietary.de.po   10 Sep 2019 23:59:30 -0000      1.161
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -455,6 +455,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
@@ -501,18 +518,6 @@
 "appeal."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary.es.po   10 Sep 2019 11:33:42 -0000      1.207
+++ proprietary.es.po   10 Sep 2019 23:59:30 -0000      1.208
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -313,6 +313,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
@@ -380,22 +397,6 @@
 "dispositivos Apple del usuario para siempre</a>. No hay posibilidad de "
 "apelación."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-"Skype se niega a decir si puede <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">escuchar las llamadas</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr "Casi seguro eso quiere decir que puede hacerlo."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -475,6 +476,20 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">eavesdrop on calls</a>."
+#~ msgstr ""
+#~ "Skype se niega a decir si puede <a href=\"http://www.slate.com/blogs/";
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">escuchar las llamadas</a>."
+
+#~ msgid "That almost certainly means it can do so."
+#~ msgstr "Casi seguro eso quiere decir que puede hacerlo."
+
+#~ msgid ""
 #~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
 #~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
 #~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary.fr.po   10 Sep 2019 12:40:46 -0000      1.252
+++ proprietary.fr.po   10 Sep 2019 23:59:30 -0000      1.253
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2019-09-10 14:39+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -308,6 +309,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
@@ -380,22 +398,6 @@
 "committed-fraud/\">banni à vie, ce qui rend ses appareils Apple plus ou "
 "moins inutilisables pour toujours</a>. C'est sans appel."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-"Skype refuse de dire s'il peut <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">écouter les appels</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr "Cela signifie sûrement qu'il en a la possibilité."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -469,3 +471,17 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">eavesdrop on calls</a>."
+#~ msgstr ""
+#~ "Skype refuse de dire s'il peut <a href=\"http://www.slate.com/blogs/";
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">écouter les appels</a>."
+
+#~ msgid "That almost certainly means it can do so."
+#~ msgstr "Cela signifie sûrement qu'il en a la possibilité."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.it-diff.html    10 Sep 2019 11:33:42 -0000      1.130
+++ proprietary.it-diff.html    10 Sep 2019 23:59:30 -0000      1.131
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
@@ -187,6 +187,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos, contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
@@ -228,14 +241,6 @@
     being cut off for life, which more-or-less cripples the user's Apple
     devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -296,7 +301,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/10 11:33:42 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary.it.po   10 Sep 2019 11:33:43 -0000      1.169
+++ proprietary.it.po   10 Sep 2019 23:59:30 -0000      1.170
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -459,6 +459,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
@@ -505,18 +522,6 @@
 "appeal."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary.ja-diff.html    10 Sep 2019 11:33:43 -0000      1.133
+++ proprietary.ja-diff.html    10 Sep 2019 23:59:30 -0000      1.134
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -123,8 +123,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a
 href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;
 to
-servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
+servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
@@ -132,8 +132,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
@@ -161,10 +161,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -185,6 +185,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos, contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
@@ -226,14 +239,6 @@
     being cut off for life, which more-or-less cripples the user's Apple
     devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -294,7 +299,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/10 11:33:43 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary.ja.po   10 Sep 2019 11:33:43 -0000      1.153
+++ proprietary.ja.po   10 Sep 2019 23:59:30 -0000      1.154
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -319,6 +319,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
@@ -365,18 +382,6 @@
 "appeal."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary.nl-diff.html    10 Sep 2019 11:33:43 -0000      1.131
+++ proprietary.nl-diff.html    10 Sep 2019 23:59:30 -0000      1.132
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -187,6 +187,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos, contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
@@ -228,14 +241,6 @@
     being cut off for life, which more-or-less cripples the user's Apple
     devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -296,7 +301,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/10 11:33:43 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary.nl.po   10 Sep 2019 11:33:43 -0000      1.143
+++ proprietary.nl.po   10 Sep 2019 23:59:30 -0000      1.144
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -361,6 +361,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
@@ -407,18 +424,6 @@
 "appeal."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.pl-diff.html    10 Sep 2019 11:33:43 -0000      1.148
+++ proprietary.pl-diff.html    10 Sep 2019 23:59:30 -0000      1.149
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 450 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>April, 2019, the pages in this directory list 
around 400
+instances of malicious functionalities (with more than 450 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -185,6 +185,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos, contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
@@ -226,14 +239,6 @@
     being cut off for life, which more-or-less cripples the user's Apple
     devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -294,7 +299,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/10 11:33:43 $
+$Date: 2019/09/10 23:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary.pl.po   10 Sep 2019 11:33:43 -0000      1.136
+++ proprietary.pl.po   10 Sep 2019 23:59:30 -0000      1.137
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -540,6 +540,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
@@ -586,18 +603,6 @@
 "appeal."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary.pot     10 Sep 2019 11:33:43 -0000      1.133
+++ proprietary.pot     10 Sep 2019 23:59:30 -0000      1.134
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -257,6 +257,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a "
+"href=\"https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/\";>found
 "
+"in iOS allowed attackers to gain access to sensitive information including "
+"private messages, passwords, photos, contacts stored on the user's "
+"iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a "
@@ -302,17 +319,6 @@
 "forever</a>.  There is no appeal."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a "
-"href=\"http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html\";>eavesdrop
 "
-"on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary.pt-br.po        10 Sep 2019 11:33:43 -0000      1.212
+++ proprietary.pt-br.po        10 Sep 2019 23:59:30 -0000      1.213
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2019-09-09 22:19-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -306,6 +306,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
@@ -371,22 +388,6 @@
 "cortado para sempre, o que prejudica mais ou menos os dispositivos Apple do "
 "usuário para sempre</a>. Não há recurso."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-"O Skype se recusa a dizer se ele pode <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">espionar chamadas</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr "Isso quase com certeza significa que ele pode fazê-lo."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -462,6 +463,20 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">eavesdrop on calls</a>."
+#~ msgstr ""
+#~ "O Skype se recusa a dizer se ele pode <a href=\"http://www.slate.com/";
+#~ "blogs/future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">espionar chamadas</a>."
+
+#~ msgid "That almost certainly means it can do so."
+#~ msgstr "Isso quase com certeza significa que ele pode fazê-lo."
+
+#~ msgid ""
 #~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
 #~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
 #~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary.ru.po   10 Sep 2019 12:30:54 -0000      1.286
+++ proprietary.ru.po   10 Sep 2019 23:59:30 -0000      1.287
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -311,6 +312,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
@@ -384,22 +402,6 @@
 "Apple этих пользователей более или менее 
увечными</a>. Обжалованию не "
 "подлежит."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-"Разработчики Skype отказываются отвечать, 
может ли он <a href=\"http://www.";
-"slate.com/blogs/future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">подслушивать переговоры</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr "Это почти наверняка означает, что 
может."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -479,6 +481,20 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">eavesdrop on calls</a>."
+#~ msgstr ""
+#~ "Разработчики Skype отказываются отвечать, 
может ли он <a href=\"http://";
+#~ "www.slate.com/blogs/future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">подслушивать переговоры</a>."
+
+#~ msgid "That almost certainly means it can do so."
+#~ msgstr "Это почти наверняка означает, что 
может."
+
+#~ msgid ""
 #~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
 #~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-";
 #~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary.zh-tw-diff.html 10 Sep 2019 11:33:43 -0000      1.110
+++ proprietary.zh-tw-diff.html 10 Sep 2019 23:59:31 -0000      1.111
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,19 +101,19 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -128,12 +128,12 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -188,6 +188,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909100"&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos, contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
@@ -229,14 +242,6 @@
     being cut off for life, which more-or-less cripples the user's Apple
     devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -297,7 +302,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/10 11:33:43 $
+$Date: 2019/09/10 23:59:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary.zh-tw.po        10 Sep 2019 11:33:43 -0000      1.121
+++ proprietary.zh-tw.po        10 Sep 2019 23:59:31 -0000      1.122
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -433,6 +433,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Keeping track of who downloads a proprietary program is a form of "
 "surveillance.  There is a proprietary program for adjusting a certain "
 "telescopic rifle sight. <a href=\"https://www.forbes.com/sites/";
@@ -479,18 +496,6 @@
 "appeal."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- pt-br.po    10 Sep 2019 11:33:43 -0000      1.172
+++ pt-br.po    10 Sep 2019 23:59:31 -0000      1.173
@@ -825,6 +825,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- ru.po       10 Sep 2019 11:55:14 -0000      1.286
+++ ru.po       10 Sep 2019 23:59:31 -0000      1.287
@@ -962,6 +962,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";
@@ -6667,12 +6684,11 @@
 "list of all the 10,000 or more people who have installed it</a>."
 msgstr ""
 "Отслеживание того, кто получает 
несвободную программу, представляет собой "
-"разновидностью слежки. Есть несвободная 
программа для юстировки "
-"прицела определенного телескопического 
ружья. "
-"<a href=\"https://www.forbes.com/sites/";
+"разновидностью слежки. Есть несвободная 
программа для юстировки прицела "
+"определенного телескопического ружья. <a 
href=\"https://www.forbes.com/sites/";
 "thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
-"names-of-10000-users-of-a-gun-scope-app/\"> Следователь США 
потребовал весь список "
-"из 10 тысяч или более людей, которые 
установили ее</a>."
+"names-of-10000-users-of-a-gun-scope-app/\"> Следователь США 
потребовал весь "
+"список из 10 тысяч или более людей, которые 
установили ее</a>."
 
 #. type: Content of: <ul><li><p>
 msgid "With a free program there would not be a list of who has installed it."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- zh-tw.po    10 Sep 2019 11:33:43 -0000      1.134
+++ zh-tw.po    10 Sep 2019 23:59:31 -0000      1.135
@@ -816,6 +816,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security.  It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of iPhone's reputation for being secure, it does have bad security "
 "flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
 "\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-";



reply via email to

[Prev in Thread] Current Thread [Next in Thread]