www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Wed, 18 Sep 2019 12:01:46 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/09/18 12:01:44

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-amazon.de-diff.html 
                         malware-amazon.de.po malware-amazon.es.po 
                         malware-amazon.fr.po 
                         malware-amazon.it-diff.html 
                         malware-amazon.it.po 
                         malware-amazon.ja-diff.html 
                         malware-amazon.ja.po malware-amazon.pot 
                         malware-amazon.ru.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po 
                         malware-cars.de-diff.html malware-cars.de.po 
                         malware-cars.fr.po malware-cars.pot 
                         malware-cars.ru.po malware-games.de-diff.html 
                         malware-games.de.po malware-games.fr.po 
                         malware-games.ja-diff.html malware-games.ja.po 
                         malware-games.pot malware-games.ru.po 
                         malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.ru.po 
                         malware-microsoft.de-diff.html 
                         malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.ru.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
                         proprietary-sabotage.de-diff.html 
                         proprietary-sabotage.de.po 
                         proprietary-sabotage.es.po 
                         proprietary-sabotage.fr.po 
                         proprietary-sabotage.it-diff.html 
                         proprietary-sabotage.it.po 
                         proprietary-sabotage.ja-diff.html 
                         proprietary-sabotage.ja.po 
                         proprietary-sabotage.pot 
                         proprietary-sabotage.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary-tethers.de-diff.html 
                         proprietary-tethers.de.po 
                         proprietary-tethers.fr.po 
                         proprietary-tethers.ja-diff.html 
                         proprietary-tethers.ja.po 
                         proprietary-tethers.pot 
                         proprietary-tethers.pt-br.po 
                         proprietary-tethers.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.pot?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.475&r2=1.476
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.324&r2=1.325
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.569&r2=1.570
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.298&r2=1.299
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.142&r2=1.143

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- de.po       18 Sep 2019 10:02:30 -0000      1.142
+++ de.po       18 Sep 2019 16:01:41 -0000      1.143
@@ -639,10 +639,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2523,9 +2523,21 @@
 "nutzbar</a>.</ins>"
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -4634,13 +4646,23 @@
 "\"tn01-ref\" class=\"transnote\">[1]</a>"
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "<ins>Vorstellbar wäre</ins>, dass Chrysler und NSA dies auch können."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "<ins>Wäre ein Fahrzeug serienmäßig mit „Infotainmentsystem“ 
ausgestattet, "
 "sollte es besser grundsätzlich deaktiviert werden.</ins>"
@@ -4903,7 +4925,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 
@@ -5963,7 +5985,13 @@
 "Software aus."
 
 #. type: Content of: <ul><li><p>
-# || No change detected.  The change might only be in amounts of spaces.
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
 #, fuzzy
 #| msgid ""
 #| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
@@ -5978,9 +6006,9 @@
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Spionageprogramme in Android-Telefonen (und „Windows-Laptops“?): Die "
 "amerikanische Tageszeitung <span xml:lang=\"en\" lang=\"en\">The Wall Street "
@@ -8214,7 +8242,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -8276,9 +8304,15 @@
 msgstr "Das macht sie zu Spionen bei der Durchsetzung von Lizenzen."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Ich [RMS] erwarte, dass es auch DRM umsetzt&#160;&#8209;&#160;dass es keine "
 "Möglichkeit gibt, eine Aufzeichnung zu speichern. Dem Artikel nach kann man "
@@ -12838,6 +12872,70 @@
 "id=\"tn01-ref\" class=\"transnote\">[1]</a>."
 
 #~ msgid ""
+#~ "The article focuses on a further nasty fillip, that sales of the broken "
+#~ "devices continued. But I think that is a secondary issue; it made the "
+#~ "nasty consequences extend to some additional people.  The fundamental "
+#~ "wrong was to design the devices to depend on something else that didn't "
+#~ "respect users' freedom."
+#~ msgstr ""
+#~ "Im Artikel wird sich auf einen weiteren bösen Ansporn konzentriert, der "
+#~ "den Verkauf der defekten Geräte fortsetzt. Aber ich [RMS] denke, dass "
+#~ "dies zweitrangig ist; es führt dazu, dass sich die bösen Folgen auf "
+#~ "einige weitere Personen ausweitet werden. Der grundlegende Fehler war die "
+#~ "Geräte so zu gestalten, dass sie von etwas anderem abhängig waren, was "
+#~ "nicht die Freiheit der Nutzer respektierte."
+
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr ""
+#~ "<ins>Vorstellbar wäre</ins>, dass Chrysler und NSA dies auch können."
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ "<ins>Wäre ein Fahrzeug serienmäßig mit „Infotainmentsystem“ 
ausgestattet, "
+#~ "sollte es besser grundsätzlich deaktiviert werden.</ins>"
+
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Android phones (and Windows? laptops): The Wall Street "
+#~| "Journal (in an article blocked from us by a paywall)  reports that <a "
+#~| "href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-";
+#~| "activate-android-and-laptop-microphones-reports-wsj\"> the FBI can "
+#~| "remotely activate the GPS and microphone in Android phones and laptops</"
+#~| "a>.  (I suspect this means Windows laptops.)  Here is <a href=\"http://";
+#~| "cryptome.org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#~ "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "Spionageprogramme in Android-Telefonen (und „Windows-Laptops“?): Die "
+#~ "amerikanische Tageszeitung <span xml:lang=\"en\" lang=\"en\">The Wall "
+#~ "Street Journal</span> berichtet (in einem von uns durch eine "
+#~ "Bezahlschranke blockierten Artikel), dass die <a href=\"//www.theverge."
+#~ "com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-"
+#~ "microphones-reports-wsj\" title=\"FBI can remotely activate Android and "
+#~ "laptop microphones, reports WSJ, unter: theverge.com 2013."
+#~ "\">amerikanische Bundespolizei FBI aus der Ferne GPS und Mikrofon in "
+#~ "Android-Telefonen und Laptops aktivieren kann</a> (vermutlich deutet dies "
+#~ "auf „Windows-Laptops“ hin). Hier <a href=\"//cryptome.org/2013/08/fbi-"
+#~ "hackers.htm\" title=\"FBI Taps Hacker Tactics to Spy on Suspects, unter: "
+#~ "cryptome.org 2013.\">weitere Informationen</a>."
+
+#~ msgid ""
+#~ "I expect it implements DRM, too&mdash;that there is no way to save a "
+#~ "recording. But I can't be sure from the article."
+#~ msgstr ""
+#~ "Ich [RMS] erwarte, dass es auch DRM umsetzt&#160;&#8209;&#160;dass es "
+#~ "keine Möglichkeit gibt, eine Aufzeichnung zu speichern. Dem Artikel nach "
+#~ "kann man aber nicht sicher sein. "
+
+#~ msgid ""
 #~ "This page is licensed under a <a rel=\"license\" href=\"http://";
 #~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
 #~ "NoDerivatives 4.0 International License</a>."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- es.po       18 Sep 2019 10:02:30 -0000      1.195
+++ es.po       18 Sep 2019 16:01:41 -0000      1.196
@@ -572,11 +572,22 @@
 "\">también cualquier otro puede observar e incluso falsear vídeos</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Es de suponer que la vulnerabilidad a terceros no es intencionada, e imagino "
 "que la Amazon lo solucionará. Pero no cuento con que Amazon cambie el 
diseño "
@@ -2288,9 +2299,21 @@
 "which\">Todas las pulseras dejaron de funcionar para siempre</a>."
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -3821,13 +3844,23 @@
 "o desactivar los frenos, entre otras cosas."
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "Es de suponer que Chrysler y la NSA también pueden hacerlo."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "Si se posee un automóvil que contiene un teléfono móvil, hay que "
 "desactivarlo."
@@ -4107,8 +4140,15 @@
 "grabaciones</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Desde el punto de vista moral no veo ninguna diferencia entre tener "
@@ -5319,7 +5359,8 @@
 # | (in an article blocked from us by a paywall) reports that <a
 # | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
 # | the FBI can remotely activate the GPS and microphone in Android phones and
-# | [-in-] laptops</a>.  (I suspect this means Windows laptops.)  Here is <a
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
 # | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
 #, fuzzy
 #| msgid ""
@@ -5327,7 +5368,7 @@
 #| "(in an article blocked from us by a paywall) reports that <a href="
 #| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
 #| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
-#| "activate the GPS and microphone in Android phones and in laptops</a>. (I "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
 #| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome.";
 #| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
@@ -5335,19 +5376,18 @@
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
-msgstr ""
-"Software espía en los teléfonos Android y ordenadores portátiles 
(¿con "
-"Windows?): El periódico <cite>The Wall Street Journal</cite>, en un 
artí"
-"culo que no podemos leer a causa de una barrera de pago, informa que <a href="
-"\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-";
-"and-laptop-microphones-reports-wsj\"> el FBI puede activar remotamente el "
-"GPS y el micrófono en los teléfonos Android y en los ordenadores portÃ"
-"¡tiles</a> (sospecho que se refieren a los portátiles con Windows). 
Aquí "
-"hay <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>más "
-"información</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
+msgstr ""
+"Software espía en teléfonos Android (¿y en portátiles con Windows?): The "
+"Wall Street Journal (en un artículo al que solo se puede acceder previo "
+"pago) informa que <a href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-";
+"remotely-activate-android-and-laptop-microphones-reports-wsj\"> el FBI puede "
+"activar de forma remota el GPS y el micrófono en teléfonos con Android y "
+"portátiles</a> (sospecho que quiere decir portátiles equipados con 
Windows). "
+"Aquí hay <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>más "
+"información</a>."
 
 #. type: Content of: <ul><li><p>
 # | {+Spyware is present in some Android devices when they are sold.+}  Some
@@ -7476,8 +7516,16 @@
 "que se le exige que notifique a los usuarios qué va a hacer con los datos."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -7567,9 +7615,15 @@
 "de las licencias."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Supongo que también implementa el DRM, que no hay manera de guardar una "
 "grabación, aunque no puedo estar seguro a partir de lo que dice el 
artículo."
@@ -11527,6 +11581,93 @@
 "procesadores Intel incorporarán software tirano</a>."
 
 #~ msgid ""
+#~ "The third party vulnerability is presumably unintentional and I suppose "
+#~ "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#~ "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#~ "Amazon to watch</a>."
+#~ msgstr ""
+#~ "Es de suponer que la vulnerabilidad a terceros no es intencionada, e "
+#~ "imagino que la Amazon lo solucionará. Pero no cuento con que Amazon "
+#~ "cambie el diseño que <a href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201901100\">le permite observar</a>."
+
+#~ msgid ""
+#~ "The article focuses on a further nasty fillip, that sales of the broken "
+#~ "devices continued. But I think that is a secondary issue; it made the "
+#~ "nasty consequences extend to some additional people.  The fundamental "
+#~ "wrong was to design the devices to depend on something else that didn't "
+#~ "respect users' freedom."
+#~ msgstr ""
+#~ "El artículo hace hincapié en la perversa decisión de continuar 
vendiendo "
+#~ "los dispositivos ya inutilizables. Pero creo que esto es algo secundario: "
+#~ "hizo que las consecuencias nocivas alcanzaran a algunas personas más. Lo "
+#~ "realmente grave fue diseñar los dispositivos de manera que tuvieran que "
+#~ "depender de algún otro que no respeta la libertad de los usuarios."
+
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr "Es de suponer que Chrysler y la NSA también pueden hacerlo."
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ "Si se posee un automóvil que contiene un teléfono móvil, hay que "
+#~ "desactivarlo."
+
+#~ msgid ""
+#~ "Morally I see no difference between having human workers listen and "
+#~ "having speech-recognition systems listen.  Both intrude on privacy."
+#~ msgstr ""
+#~ "Desde el punto de vista moral no veo ninguna diferencia entre tener "
+#~ "trabajadores humanos a la escucha y tener sistemas de reconocimiento del "
+#~ "habla."
+
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Android phones (and Windows? laptops): The Wall Street "
+#~| "Journal (in an article blocked from us by a paywall) reports that <a "
+#~| "href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-";
+#~| "activate-android-and-laptop-microphones-reports-wsj\"> the FBI can "
+#~| "remotely activate the GPS and microphone in Android phones and in "
+#~| "laptops</a>. (I suspect this means Windows laptops.) Here is <a href="
+#~| "\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>."
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#~ "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "Software espía en los teléfonos Android y ordenadores portátiles 
(¿con "
+#~ "Windows?): El periódico <cite>The Wall Street Journal</cite>, en un 
artí"
+#~ "culo que no podemos leer a causa de una barrera de pago, informa que <a "
+#~ "href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#~ "android-and-laptop-microphones-reports-wsj\"> el FBI puede activar "
+#~ "remotamente el GPS y el micrófono en los teléfonos Android y en los "
+#~ "ordenadores portátiles</a> (sospecho que se refieren a los 
portátiles "
+#~ "con Windows). Aquí hay <a 
href=\"http://cryptome.org/2013/08/fbi-hackers.";
+#~ "htm\">más información</a>."
+
+#~ msgid ""
+#~ "I think that lawsuit is about a side issue. What the company does with "
+#~ "the data is a secondary issue. The principal wrong here is that the "
+#~ "company gets that data at all."
+#~ msgstr ""
+#~ "Pienso que esta demanda aborda un asunto colateral. Lo que la compañía "
+#~ "haga con los datos es una cuestión secundaria. El principal daño aquí 
es "
+#~ "que la compañía recoja esos datos."
+
+#~ msgid ""
+#~ "I expect it implements DRM, too&mdash;that there is no way to save a "
+#~ "recording. But I can't be sure from the article."
+#~ msgstr ""
+#~ "Supongo que también implementa el DRM, que no hay manera de guardar una "
+#~ "grabación, aunque no puedo estar seguro a partir de lo que dice el "
+#~ "artículo."
+
+#~ msgid ""
 #~ "This page is licensed under a <a rel=\"license\" href=\"http://";
 #~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
 #~ "NoDerivatives 4.0 International License</a>."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- fr.po       18 Sep 2019 10:48:29 -0000      1.246
+++ fr.po       18 Sep 2019 16:01:41 -0000      1.247
@@ -546,11 +546,22 @@
 "peut en faire autant, et peut également falsifier les vidéos</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Une vulnérabilité à des attaques de tiers est vraisemblablement 
involontaire "
 "et je suppose qu'Amazon la corrigera. Cependant je ne m'attends pas à ce "
@@ -2181,9 +2192,21 @@
 "traqueurs existants ont cessé de fonctionner pour toujours</a>."
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -3805,13 +3828,23 @@
 "activer et désactiver les freins, et plus encore."
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "J'imagine que Chrysler et la NSA peuvent faire de même."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "Si un jour je possède une voiture et qu'elle contient un téléphone 
portable, "
 "je le désactiverai."
@@ -4072,8 +4105,15 @@
 "d'écouter les enregistrements</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Du point de vue éthique, je ne vois aucune différence entre l'écoute par 
des "
@@ -5106,14 +5146,30 @@
 "autres logiciels installés."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#| "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
 "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Des logiciels espions dans les téléphones Android et les ordinateurs "
 "portables (sous Windows ?) : le <cite>Wall Street Journal</cite> (dans un "
@@ -7042,8 +7098,16 @@
 "données."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -7129,9 +7193,15 @@
 "Ainsi elle fait office d'espionne au service de l'application des licences."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Je suppose qu'elle implémente aussi la gestion numérique des restrictions 
– "
 "qu'il n'y a aucun moyen de sauvegarder un enregistrement. Mais je ne peux "
@@ -10971,3 +11041,83 @@
 msgstr ""
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>Les "
 "processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid ""
+#~ "The third party vulnerability is presumably unintentional and I suppose "
+#~ "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#~ "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#~ "Amazon to watch</a>."
+#~ msgstr ""
+#~ "Une vulnérabilité à des attaques de tiers est vraisemblablement "
+#~ "involontaire et je suppose qu'Amazon la corrigera. Cependant je ne "
+#~ "m'attends pas à ce qu'Amazon change la caractéristique de l'appareil qui 
"
+#~ "<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">lui "
+#~ "permet, à elle, de regarder</a>."
+
+#~ msgid ""
+#~ "The article focuses on a further nasty fillip, that sales of the broken "
+#~ "devices continued. But I think that is a secondary issue; it made the "
+#~ "nasty consequences extend to some additional people.  The fundamental "
+#~ "wrong was to design the devices to depend on something else that didn't "
+#~ "respect users' freedom."
+#~ msgstr ""
+#~ "Cet article souligne un effet pervers supplémentaire, à savoir que les "
+#~ "ventes d'appareils inutilisables ont continué. Mais je pense que c'est "
+#~ "secondaire ; cela a simplement étendu le préjudice à quelques autre "
+#~ "personnes. La faute première, c'est d'avoir conçu des appareils "
+#~ "dépendants d'une chose extérieure qui ne respecte pas la liberté des "
+#~ "utilisateurs."
+
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr "J'imagine que Chrysler et la NSA peuvent faire de même."
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ "Si un jour je possède une voiture et qu'elle contient un téléphone "
+#~ "portable, je le désactiverai."
+
+#~ msgid ""
+#~ "Morally I see no difference between having human workers listen and "
+#~ "having speech-recognition systems listen.  Both intrude on privacy."
+#~ msgstr ""
+#~ "Du point de vue éthique, je ne vois aucune différence entre l'écoute 
par "
+#~ "des employés humains et l'écoute par des systèmes de reconnaissance "
+#~ "vocale. Toutes deux portent atteinte à la vie privée."
+
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#~ "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "Des logiciels espions dans les téléphones Android et les ordinateurs "
+#~ "portables (sous Windows ?) : le <cite>Wall Street Journal</cite> (dans 
un "
+#~ "article pourvu d'une barrière à péage) rapporte que <a 
href=\"http://www.";
+#~ "theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
+#~ "laptop-microphones-reports-wsj\">le FBI peut activer à distance le GPS et 
"
+#~ "le micro des téléphones Android et des ordinateurs portables</a> (je "
+#~ "soupçonne qu'ils parlent des ordinateurs sous Windows) ; voici des <a "
+#~ "href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>informations "
+#~ "complémentaires</a>."
+
+#~ msgid ""
+#~ "I think that lawsuit is about a side issue. What the company does with "
+#~ "the data is a secondary issue. The principal wrong here is that the "
+#~ "company gets that data at all."
+#~ msgstr ""
+#~ "Je pense que cette action en justice s'intéresse à un problème annexe. 
Ce "
+#~ "que fait la société avec les données est secondaire. Son tort principal 
"
+#~ "est de se les accaparer."
+
+#~ msgid ""
+#~ "I expect it implements DRM, too&mdash;that there is no way to save a "
+#~ "recording. But I can't be sure from the article."
+#~ msgstr ""
+#~ "Je suppose qu'elle implémente aussi la gestion numérique des 
restrictions "
+#~ "– qu'il n'y a aucun moyen de sauvegarder un enregistrement. Mais je ne "
+#~ "peux pas en être sûr d'après l'article."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- it.po       18 Sep 2019 10:02:31 -0000      1.142
+++ it.po       18 Sep 2019 16:01:41 -0000      1.143
@@ -598,10 +598,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2439,7 +2439,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -4331,13 +4331,23 @@
 "Jeep."
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "Se si possiede un'automobile che contiene tra i suoi componenti un telefono "
 "cellulare, è opportuno considerare se disattivarlo."
@@ -4612,7 +4622,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 
@@ -5642,7 +5652,13 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-# || No change detected.  The change might only be in amounts of spaces.
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
 #, fuzzy
 #| msgid ""
 #| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
@@ -5657,9 +5673,9 @@
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Spyware nei telefoni Android (e computer portatili, forse Windows): il Wall "
 "Street Journal (in un articolo che può essere letto solo previo pagamento) "
@@ -7774,7 +7790,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -7834,8 +7850,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -12112,6 +12128,44 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>I "
 "processori Intel avranno del software tiranno preinstallato</a>."
 
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr ""
+#~ "Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso."
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ "Se si possiede un'automobile che contiene tra i suoi componenti un "
+#~ "telefono cellulare, è opportuno considerare se disattivarlo."
+
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Android phones (and Windows? laptops): The Wall Street "
+#~| "Journal (in an article blocked from us by a paywall)  reports that <a "
+#~| "href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-";
+#~| "activate-android-and-laptop-microphones-reports-wsj\"> the FBI can "
+#~| "remotely activate the GPS and microphone in Android phones and laptops</"
+#~| "a>.  (I suspect this means Windows laptops.)  Here is <a href=\"http://";
+#~| "cryptome.org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#~ "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "Spyware nei telefoni Android (e computer portatili, forse Windows): il "
+#~ "Wall Street Journal (in un articolo che può essere letto solo previo "
+#~ "pagamento) afferma che <a href=\"http://www.theverge.com/2013/8/1/4580718/";
+#~ "fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"
+#~ "\">l'FBI può attivare remotamente il GPS ed il microfono di telefoni "
+#~ "Android e computer portatili</a>. (Sospettiamo si tratti di computer "
+#~ "portatili Windows.) <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
+#~ "\">Ulteriori informazioni</a>."
+
 #~ msgid ""
 #~ "This page is licensed under a <a rel=\"license\" href=\"http://";
 #~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- ja.po       18 Sep 2019 10:02:31 -0000      1.149
+++ ja.po       18 Sep 2019 16:01:41 -0000      1.150
@@ -496,10 +496,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1899,7 +1899,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -3282,13 +3282,19 @@
 "めたり、などなどできたのです。"
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "クライスラーとNSAもできるとわたしは考えます。"
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 
"もし、車を持つなら、そしてそれに携帯電話がついているならば、わたしはそれを止"
 "めるでしょう。"
@@ -3513,7 +3519,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 
@@ -4346,14 +4352,23 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#| "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
 "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "(ペイ・ウォールでブロックされる記事です)は<a 
href=\"http://www.theverge.";
 "com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-"
@@ -5989,7 +6004,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -6049,8 +6064,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -9442,6 +9457,32 @@
 "<a 
href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>インテルの"
 
"プロセッサには暴君ソフトウェアが組み込まれるようになります</a>。"
 
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr "クライスラーとNSAもできるとわたしは考えます。"
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ 
"もし、車を持つなら、そしてそれに携帯電話がついているならば、わたしはそれを"
+#~ "止めるでしょう。"
+
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#~ "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "(ペイ・ウォールでブロックされる記事です)は<a 
href=\"http://www.theverge.";
+#~ "com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-"
+#~ "microphones-reports-wsj\">FBIが遠
隔操作でアンドロイドとラップトップのGPSと"
+#~ "マイクロフォンを有効にできる</a>、とå 
±å‘Šã—ています。 (ウィドウズのラップ"
+#~ "トップだろうと思われます。) こちらに<a 
href=\"http://cryptome.org/2013/08/";
+#~ "fbi-hackers.htm\">もっと多くの情報(英語)</a>があります。"
+
 #~ msgid ""
 #~ "This page is licensed under a <a rel=\"license\" href=\"http://";
 #~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-amazon.de-diff.html 29 May 2019 06:00:57 -0000      1.21
+++ malware-amazon.de-diff.html 18 Sep 2019 16:01:41 -0000      1.22
@@ -276,7 +276,7 @@
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
-    unintentional and I suppose Amazon will fix it. I
+    unintentional and Amazon will probably fix it. However, we
     do not expect Amazon to change the design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
@@ -370,7 +370,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/29 06:00:57 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- malware-amazon.de.po        29 May 2019 06:00:57 -0000      1.25
+++ malware-amazon.de.po        18 Sep 2019 16:01:41 -0000      1.26
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-09-26 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -367,10 +367,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-amazon.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-amazon.es.po        15 Sep 2019 21:06:07 -0000      1.35
+++ malware-amazon.es.po        18 Sep 2019 16:01:41 -0000      1.36
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-05-29 11:15+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -342,11 +343,22 @@
 "\">también cualquier otro puede observar e incluso falsear vídeos</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Es de suponer que la vulnerabilidad a terceros no es intencionada, e imagino "
 "que la Amazon lo solucionará. Pero no cuento con que Amazon cambie el 
diseño "

Index: malware-amazon.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- malware-amazon.fr.po        30 May 2019 05:14:06 -0000      1.41
+++ malware-amazon.fr.po        18 Sep 2019 16:01:41 -0000      1.42
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-05-30 07:12+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -337,11 +338,22 @@
 "peut en faire autant, et peut également falsifier les vidéos</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Une vulnérabilité à des attaques de tiers est vraisemblablement 
involontaire "
 "et je suppose qu'Amazon la corrigera. Cependant je ne m'attends pas à ce "

Index: malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-amazon.it-diff.html 29 May 2019 06:00:57 -0000      1.35
+++ malware-amazon.it-diff.html 18 Sep 2019 16:01:41 -0000      1.36
@@ -276,7 +276,7 @@
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
-    unintentional and I suppose Amazon will fix it. I
+    unintentional and Amazon will probably fix it. However, we
     do not expect Amazon to change the design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
@@ -370,7 +370,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/29 06:00:57 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- malware-amazon.it.po        29 May 2019 06:00:57 -0000      1.28
+++ malware-amazon.it.po        18 Sep 2019 16:01:41 -0000      1.29
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-09-30 22:48+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -345,10 +345,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-amazon.ja-diff.html 26 Jun 2019 20:32:25 -0000      1.34
+++ malware-amazon.ja-diff.html 18 Sep 2019 16:01:41 -0000      1.35
@@ -56,11 +56,10 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
-<span class="removed"><del><strong>&lt;/div&gt;
-
-&lt;div class="toc"&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
 
-&lt;div <span class="removed"><del><strong>class="malfunctions"&gt;
+&lt;div <span class="removed"><del><strong>class="toc"&gt;
+&lt;div class="malfunctions"&gt;
 &lt;ul&gt;
 &lt;li&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
@@ -265,7 +264,7 @@
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
-    unintentional and I suppose Amazon will fix it. I
+    unintentional and Amazon will probably fix it. However, we
     do not expect Amazon to change the design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
@@ -359,7 +358,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/06/26 20:32:25 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-amazon.ja.po        26 Jun 2019 09:01:19 -0000      1.21
+++ malware-amazon.ja.po        18 Sep 2019 16:01:41 -0000      1.22
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2016-10-31 11:24+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -289,10 +289,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-amazon.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.pot,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-amazon.pot  29 May 2019 06:00:57 -0000      1.18
+++ malware-amazon.pot  18 Sep 2019 16:01:41 -0000      1.19
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -237,10 +237,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a "
-"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
-"to watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-amazon.ru.po        29 May 2019 15:31:37 -0000      1.43
+++ malware-amazon.ru.po        18 Sep 2019 16:01:41 -0000      1.44
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-10-08 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -337,11 +338,22 @@
 "видеоизображение</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Уязвимость третьей стороны, 
предположительно, была непреднамеренной, и 
я "
 "полагаю, в Amazon это исправят. Но я не думаю, 
что Amazon изменит устройство "

Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-appliances.de-diff.html     13 Sep 2019 12:31:16 -0000      1.45
+++ malware-appliances.de-diff.html     18 Sep 2019 16:01:41 -0000      1.46
@@ -118,7 +118,7 @@
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability</em></ins></span> is <span 
class="removed"><del><strong>connected</strong></del></span> <span 
class="inserted"><ins><em>presumably
-    unintentional and I suppose Amazon will fix it. I
+    unintentional and Amazon will probably fix it. However, we
     do not expect Amazon</em></ins></span> to <span 
class="inserted"><ins><em>change</em></ins></span> the <span 
class="removed"><del><strong>internet. Naturally &lt;a
 
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
@@ -238,300 +238,283 @@
     <span class="removed"><del><strong>computer, the TV reports what it is. 
The existence of</strong></del></span> <span class="inserted"><ins><em>router 
(which can
     be an old computer running completely free software), and set 
up</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span>
     <span class="inserted"><ins><em>firewall</em></ins></span> to
-    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden</strong></del></span> <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or,</em></ins></span> as <span 
class="removed"><del><strong>it was in
-    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
last resort,
-    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>block connections to Vizio's servers. Or, as a last 
resort,
+    you can replace your TV with another model.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>were</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
+    manufacturers promise</em></ins></span> not <span 
class="removed"><del><strong>hidden as it was</strong></del></span> <span 
class="inserted"><ins><em>to look at what's</em></ins></span> in
+    <span class="removed"><del><strong>these TVs, does</strong></del></span> 
<span class="inserted"><ins><em>the videos. That's</em></ins></span> not <span 
class="removed"><del><strong>legitimize</strong></del></span>
+    <span class="inserted"><ins><em>security for your home. Security means 
making sure they don't get to
+    see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at 
blocking</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>use of independent replacement ink 
cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;More or less</strong></del></span>
+&lt;p&gt;More or less all</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly</em></ins></span> all <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;home security 
cameras&rdquo;</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201809260"&gt;
+    &lt;p&gt;Honeywell's</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>thermostats communicate
+    only through the company's server. They have
+    all the nasty characteristics of such devices:</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;The report was as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got
+    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
+    surveillance, and danger</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got
 better.&lt;/p&gt;
 
-&lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
-    name!&lt;/p&gt;
-
-    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span class="inserted"><ins><em>these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+&lt;p&gt;This shows that laws requiring products to get users' formal
 consent before collecting personal data are totally inadequate.  And
-what happens if a user declines consent?  Probably</strong></del></span> <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>TV will say,
-&ldquo;Without</strong></del></span> <span class="inserted"><ins><em>videos. 
That's not
-    security for</em></ins></span> your <span 
class="removed"><del><strong>consent</strong></del></span> <span 
class="inserted"><ins><em>home. Security means making sure they don't 
get</em></ins></span> to <span class="removed"><del><strong>tracking, the TV 
will not
+what happens if</strong></del></span> <span 
class="inserted"><ins><em>sabotage&lt;/a&gt; (of</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV will say,
+&ldquo;Without your consent to tracking,</strong></del></span> <span 
class="inserted"><ins><em>specific user, or of
+    all users at once), as well as</em></ins></span> the <span 
class="removed"><del><strong>TV will not
 work.&rdquo;&lt;/p&gt;
 
-&lt;p&gt;Proper laws would say that TVs</strong></del></span>
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;p&gt;Proper laws would say that TVs are not allowed to 
report</strong></del></span> <span class="inserted"><ins><em>risk of an outage 
(which is</em></ins></span> what
+    <span class="inserted"><ins><em>just happened).&lt;/p&gt;
 
-  &lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers</em></ins></span> are <span 
class="removed"><del><strong>not allowed to report what</strong></del></span> 
<span class="inserted"><ins><em>very innovative&mdash;at 
blocking</em></ins></span> the
+    &lt;p&gt;In addition, setting</em></ins></span> the
 <span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;
 &lt;/li&gt;
 &lt;li&gt;
 &lt;p&gt;Some LG
-TVs</strong></del></span>
-    <span class="inserted"><ins><em>use of independent replacement ink 
cartridges. Their &ldquo;security
-    upgrades&rdquo; occasionally impose new forms of cartridge 
DRM.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
-tyrants&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
-    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+TVs &lt;a href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
+tyrants&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
+    nonfree software. With an old-fashioned thermostat, you can do it
+    using controls right on the thermostat.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;&lt;a
 
href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
 Samsung &ldquo;Smart&rdquo; TVs</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through the company's server. They</em></ins></span> have <span 
class="removed"><del><strong>turned Linux into</strong></del></span>
-    <span class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>base
+  <span class="inserted"><ins><em>&lt;li id="M201809240"&gt;
+    &lt;p&gt;Researchers</em></ins></span> have <span 
class="removed"><del><strong>turned Linux into the base
 for a tyrant system&lt;/a&gt; so as to impose DRM.
-What enables Samsung to do this is that Linux is released under
-GNU GPL version 2,</strong></del></span> <span class="inserted"><ins><em>nasty 
characteristics of such devices:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
-together with</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of</em></ins></span> a 
<span class="removed"><del><strong>weak interpretation</strong></del></span> 
<span class="inserted"><ins><em>specific user, or</em></ins></span> of <span 
class="removed"><del><strong>GPL version 2.
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;A company that makes internet-controlled vibrators
-&lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-being sued for collecting lots</strong></del></span>
-    <span class="inserted"><ins><em>all users at once), as well as the 
risk</em></ins></span> of <span class="removed"><del><strong>personal 
information about how
-people use it&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;The company's statement that it anonymizes</strong></del></span> 
<span class="inserted"><ins><em>an outage (which is what
-    just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>data may be true,
-but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can 
do</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span>
-    <span class="inserted"><ins><em>using controls right on</em></ins></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>thermostat.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how to &lt;a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
+What enables Samsung</strong></del></span> <span 
class="inserted"><ins><em>discovered how</em></ins></span> to <span 
class="removed"><del><strong>do this is that Linux is released under
+GNU GPL version 2,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
+together with a weak interpretation of GPL version 2.</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
     hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
+    them, but Alexa and Siri can.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807050"&gt;
-    &lt;p&gt;The Jawbone fitness tracker was tethered</em></ins></span> to a 
<span class="removed"><del><strong>data broker,</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone
-    app.  In 2017,</em></ins></span> the <span 
class="removed"><del><strong>data broker can figure out 
who</strong></del></span> <span class="inserted"><ins><em>company shut down and 
made</em></ins></span> the <span class="removed"><del><strong>user is.&lt;/p&gt;
-&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;A</strong></del></span>
 
-&lt;li&gt;
-&lt;p&gt;Google/Alphabet</strong></del></span> <span 
class="inserted"><ins><em>app stop working.</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
-intentionally broke Revolv home automatic control products that 
depended</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201807050"&gt;
+    &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
+    app.  In 2017, the</em></ins></span> company <span 
class="removed"><del><strong>that makes internet-controlled 
vibrators</strong></del></span> <span class="inserted"><ins><em>shut down and 
made the app stop working.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+being sued for collecting lots of personal information about how
+people use it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
-    the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
+    the existing trackers stopped working 
forever&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The article focuses</em></ins></span> on a <span 
class="removed"><del><strong>server&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>further nasty fillip, that sales of the
-    broken devices continued. But I think that is a secondary issue;
-    it made the nasty consequences extend</em></ins></span> to <span 
class="removed"><del><strong>function.</strong></del></span> <span 
class="inserted"><ins><em>some additional people.</em></ins></span>
-    The <span class="removed"><del><strong>lesson is, don't stand for that! 
Insist</strong></del></span> <span class="inserted"><ins><em>fundamental wrong 
was to design the devices to depend</em></ins></span> on <span 
class="removed"><del><strong>self-contained computers</strong></del></span> 
<span class="inserted"><ins><em>something
-    else</em></ins></span> that <span class="removed"><del><strong>run free 
software!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>didn't respect users' 
freedom.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>company's 
statement</strong></del></span> <span class="inserted"><ins><em>article focuses 
on a further nasty fillip,</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes</strong></del></span> <span 
class="inserted"><ins><em>sales of</em></ins></span> the <span 
class="removed"><del><strong>data may be true,
+but it doesn't really matter. If</strong></del></span>
+    <span class="inserted"><ins><em>broken devices continued. But we think 
that is a secondary issue;</em></ins></span>
+    it <span class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>made</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>nasty consequences extend</em></ins></span> to <span 
class="removed"><del><strong>a data broker,</strong></del></span> <span 
class="inserted"><ins><em>some additional people.
+    The fundamental wrong was to design</em></ins></span> the <span 
class="inserted"><ins><em>devices to depend on something
+    else that didn't respect users' freedom.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;ARRIS cable modem has a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-backdoor in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+  &lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company &lt;a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
     offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sending usage</em></ins></span> data <span 
class="removed"><del><strong>broker can figure out who</strong></del></span> 
<span class="inserted"><ins><em>back over</em></ins></span> the <span 
class="removed"><del><strong>user is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo;</strong></del></span>
+&lt;p&gt;Google/Alphabet</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>use the proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors that give HP
-&lt;a
-href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
-remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
-access</strong></del></span> <span class="inserted"><ins><em>install a 
surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link</em></ins></span> to the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>article for</em></ins></span> the <span 
class="removed"><del><strong>back door allows
-installation of software changes, a change could be 
installed</strong></del></span> <span class="inserted"><ins><em>facts it 
presents. It
-    is too bad</em></ins></span> that
-<span class="removed"><del><strong>would give access to</strong></del></span> 
the <span class="removed"><del><strong>customer's data.
-&lt;/p&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
+intentionally broke Revolv home automatic control 
products</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>depended on</strong></del></span> <span 
class="inserted"><ins><em>install</em></ins></span> a <span 
class="removed"><del><strong>server&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>function.  The lesson is, don't 
stand</strong></del></span> <span class="inserted"><ins><em>the 
article</em></ins></span> for <span class="removed"><del><strong>that! Insist
+on self-contained computers</strong></del></span> <span 
class="inserted"><ins><em>the facts it presents. It
+    is too bad</em></ins></span> that <span class="removed"><del><strong>run 
free software!&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
-dlink of an eye.&lt;/p&gt;
-
-&lt;p&gt;
-&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models</strong></del></span> <span class="inserted"><ins><em>article finishes 
by advocating the
-    moral weakness</em></ins></span> of <span 
class="removed"><del><strong>routers
-have back doors&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;ARRIS cable modem has a &lt;a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+backdoor in</strong></del></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;</strong></del></span> 
<span class="inserted"><ins><em>surrendering to Netflix.</em></ins></span> The 
<span class="removed"><del><strong>TP-Link router has a 
backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use</strong></del></span> 
<span class="inserted"><ins><em>article finishes by 
advocating</em></ins></span> the <span class="removed"><del><strong>proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors that give 
HP</strong></del></span>
+    <span class="inserted"><ins><em>moral weakness of surrendering to Netflix. 
The Netflix app</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock users in</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
-&ldquo;Cube&rdquo; 3D printer was</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely to Apple services&lt;/a&gt; by being</em></ins></span> designed 
<span class="inserted"><ins><em>to be incompatible</em></ins></span>
-    with <span class="removed"><del><strong>DRM&lt;/a&gt;: it won't accept
-third-party printing materials.  It is</strong></del></span> <span 
class="inserted"><ins><em>all other options, ethical or unethical.&lt;/p&gt;
+  &lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock users in &lt;a
+    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely</em></ins></span> to <span class="removed"><del><strong>them.  HP 
claims that this does not give HP
+access</strong></del></span> <span class="inserted"><ins><em>Apple 
services&lt;/a&gt; by being designed</em></ins></span> to <span 
class="inserted"><ins><em>be incompatible
+    with all other options, ethical or unethical.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712240"&gt;
-    &lt;p&gt;One of</em></ins></span> the <span 
class="removed"><del><strong>Keurig</strong></del></span> <span 
class="inserted"><ins><em>dangers</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it</strong></del></span> <span 
class="inserted"><ins><em>the &ldquo;internet of stings&rdquo;</em></ins></span>
-    is
-<span class="removed"><del><strong>being discontinued, which means that 
eventually authorized materials won't</strong></del></span> <span 
class="inserted"><ins><em>that, if you lose your internet service, you also 
&lt;a
+    &lt;p&gt;One of</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>dangers of</em></ins></span> the <span 
class="removed"><del><strong>back door allows
+installation</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;internet</em></ins></span> of <span 
class="removed"><del><strong>software changes,</strong></del></span> <span 
class="inserted"><ins><em>stings&rdquo;
+    is that, if you lose your internet service, you also &lt;a
     
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
     lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;For your safety, don't use any appliance with a connection to the
-    real internet.&lt;/p&gt;
+    &lt;p&gt;For your safety, don't use any appliance with</em></ins></span> a 
<span class="removed"><del><strong>change could be installed that
+would give access</strong></del></span> <span 
class="inserted"><ins><em>connection</em></ins></span> to the <span 
class="removed"><del><strong>customer's data.
+&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>real internet.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers to</em></ins></span> be <span 
class="removed"><del><strong>available</strong></del></span> <span 
class="inserted"><ins><em>suckers</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
-    it,</em></ins></span> the <span class="removed"><del><strong>printers may 
become unusable.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
+dlink of an eye.&lt;/p&gt;
+
+&lt;p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
+    &lt;p&gt;Amazon recently invited consumers to be suckers 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764"&gt;Many
 models of routers
+have back doors&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-&lt;p&gt;With</strong></del></span> <span class="inserted"><ins><em>system 
has</em></ins></span> a <span class="inserted"><ins><em>grave security 
flaw.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
+    it, the system</em></ins></span> has a <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>grave security 
flaw.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer that gets</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, this problem 
would not
-even be a remote possibility.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The &lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+&ldquo;Cube&rdquo; 3D printer</strong></del></span>
 
-&lt;p&gt;How pitiful that</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy</em></ins></span> was <span 
class="removed"><del><strong>designed with DRM&lt;/a&gt;: it won't accept
+third-party printing materials.  It is the Keurig</strong></del></span> <span 
class="inserted"><ins><em>found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it is
+being discontinued, which means that eventually authorized materials won't
+be available and</strong></del></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
+
+&lt;p&gt;With a</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711080"&gt;
     &lt;p&gt;Logitech will sabotage
-    all Harmony Link household control devices by &lt;a
-    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
-    turning off</em></ins></span> the <span 
class="removed"><del><strong>author of that article says that there was
-&ldquo;nothing wrong&rdquo; with designing</strong></del></span> <span 
class="inserted"><ins><em>server through which</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>products' supposed owners
-    communicate with them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The owners suspect this is</em></ins></span> to <span 
class="removed"><del><strong>restrict users in
-the first place.  This is like putting</strong></del></span> <span 
class="inserted"><ins><em>pressure them to buy</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;cheat me and mistreat me&rdquo;
-sign on your chest.  We should know better: we should condemn all companies
-that take advantage of people like him.  Indeed, it is the acceptance of
-their unjust practice</strong></del></span> <span 
class="inserted"><ins><em>newer model. If
-    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that <span class="removed"><del><strong>teaches 
people</strong></del></span>
-    <span class="inserted"><ins><em>requires users</em></ins></span> to <span 
class="removed"><del><strong>be doormats.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>talk with them through some specialized 
service.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs &lt;a
-href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
-have been designed not to interact</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201710040"&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate</em></ins></span> with <span 
class="removed"><del><strong>other companies' smart
-lightbulbs&lt;/a&gt;.&lt;/p&gt;
+    all Harmony Link household control devices by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer that gets</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
+    turning off</em></ins></span> the <span 
class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, this problem 
would not
+even be a remote possibility.&lt;/p&gt;
 
-&lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't 
build</strong></del></span> it, <span 
class="removed"><del><strong>it</strong></del></span> is
-<span class="removed"><del><strong>cleverly serving its manufacturer 
&lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
-&lt;/li&gt;
+&lt;p&gt;How pitiful that</strong></del></span> <span 
class="inserted"><ins><em>server through which</em></ins></span> the <span 
class="removed"><del><strong>author of that article says that there was
+&ldquo;nothing wrong&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>products' supposed owners
+    communicate</em></ins></span> with <span 
class="removed"><del><strong>designing the device</strong></del></span> <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
-DVDs and Bluray disks have DRM&lt;/a&gt;.
-&lt;/p&gt;
+    &lt;p&gt;The owners suspect this is</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>pressure them to buy a newer model. If
+    they are wise, they will learn, rather, to distrust any product that
+    requires</em></ins></span> users <span class="removed"><del><strong>in
+the first place.  This</strong></del></span> <span 
class="inserted"><ins><em>to talk with them through some specialized 
service.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;p&gt;That page uses spin terms that favor DRM,
-including &lt;a 
href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
-digital &ldquo;rights&rdquo; management&lt;/a&gt;
-and</strong></del></span> <span class="inserted"><ins><em>a surveillance 
device.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,
-and it claims</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+  &lt;li id="M201710040"&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
+    manufacturer can communicate with it,</em></ins></span> is <span 
class="removed"><del><strong>like putting</strong></del></span> a <span 
class="removed"><del><strong>&ldquo;cheat me and mistreat me&rdquo;
+sign</strong></del></span> <span class="inserted"><ins><em>surveillance 
device. &lt;a
+    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
     Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on
-    the fact</em></ins></span> that <span 
class="removed"><del><strong>&ldquo;artists&rdquo; (rather than companies) are
-primarily responsible for putting digital restrictions management into
-these disks.  Nonetheless, it</strong></del></span> <span 
class="inserted"><ins><em>the device</em></ins></span> is <span 
class="inserted"><ins><em>tethered to</em></ins></span> a <span 
class="removed"><del><strong>reference for</strong></del></span> <span 
class="inserted"><ins><em>server.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by the manufacturer, 
based</em></ins></span> on <span class="removed"><del><strong>your chest.  We 
should know better: we should condemn all companies</strong></del></span>
+    <span class="inserted"><ins><em>the fact</em></ins></span> that <span 
class="removed"><del><strong>take advantage of people like him.  
Indeed,</strong></del></span> <span class="inserted"><ins><em>the device is 
tethered to a server.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
     proprietary tethering&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;But it also demonstrates that</em></ins></span> the <span 
class="removed"><del><strong>facts.
-&lt;/p&gt;
-
-&lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
-don't use Bluray disks!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device gives the company
-    surveillance capability.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;But</em></ins></span> it <span class="inserted"><ins><em>also 
demonstrates that the device gives the company
+    surveillance capability.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="cameras-bugs"&gt;
-&lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</strong></del></span> <span class="inserted"><ins><em>id="M201709200"&gt;
+  &lt;li id="M201709200"&gt;
     &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
-    designed for hospitals is connected to the internet. 
Naturally</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
-    its</em></ins></span> security <span 
class="removed"><del><strong>bugs</strong></del></span> <span 
class="inserted"><ins><em>has been cracked&lt;/a&gt;.&lt;/p&gt;
+    designed for hospitals</em></ins></span> is <span 
class="inserted"><ins><em>connected to</em></ins></span> the <span 
class="removed"><del><strong>acceptance of
+their unjust practice</strong></del></span> <span 
class="inserted"><ins><em>internet. Naturally &lt;a
+    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>allow anyone</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the term &lt;a
+    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>teaches people</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring</em></ins></span> to <span class="removed"><del><strong>watch 
through them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
+    referring</em></ins></span> to <span class="removed"><del><strong>be 
doormats.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big</strong></del></span>
+&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad</em></ins></span> security <span 
class="removed"><del><strong>hole; &lt;a
-href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
+have been designed not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to <span class="removed"><del><strong>interact with other companies' smart
+lightbulbs&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+&lt;p&gt;If</strong></del></span> <span class="inserted"><ins><em>snoop on the 
people that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be</em></ins></span> a <span 
class="removed"><del><strong>product is &ldquo;smart&rdquo;, and you didn't 
build it, it</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that the article uses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is
+<span class="removed"><del><strong>cleverly serving its manufacturer 
&lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
+DVDs and Bluray disks have DRM&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;That page uses spin terms</strong></del></span> <span 
class="inserted"><ins><em>unfortunate</em></ins></span> that <span 
class="removed"><del><strong>favor DRM,
+including</strong></del></span> <span class="inserted"><ins><em>the article 
uses the term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+digital &ldquo;rights&rdquo; management&lt;/a&gt;
+and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708230"&gt;
-    &lt;p&gt;Sonos &lt;a
-    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
+    &lt;p&gt;Sonos</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
     told all its customers, &ldquo;Agree&rdquo;
     to snooping or the product will stop working&lt;/a&gt;.  &lt;a
     
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
     Another article&lt;/a&gt; says they won't forcibly change the software, but
-    people won't be able to get any upgrades and eventually it will
+    people won't be able to get any upgrades</em></ins></span> and <span 
class="inserted"><ins><em>eventually</em></ins></span> it <span 
class="removed"><del><strong>claims that &ldquo;artists&rdquo; (rather than 
companies)</strong></del></span> <span class="inserted"><ins><em>will
     stop working.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -543,11 +526,12 @@
   &lt;/li&gt;
 
   &lt;li id="M201706200"&gt;
-    &lt;p&gt;Many models of Internet-connected cameras
-    are tremendously insecure.  They have login
+    &lt;p&gt;Many models of Internet-connected cameras</em></ins></span>
+    are
+<span class="removed"><del><strong>primarily responsible for putting digital 
restrictions management into</strong></del></span> <span 
class="inserted"><ins><em>tremendously insecure.  They have login
     accounts with hard-coded passwords, which can't be changed, and &lt;a
     
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
-    is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+    is no way to delete</em></ins></span> these <span 
class="removed"><del><strong>disks.  Nonetheless,</strong></del></span> <span 
class="inserted"><ins><em>accounts either&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705250"&gt;
@@ -720,10 +704,8 @@
 
   &lt;li id="M201605020"&gt;
     &lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big security hole; &lt;a
-    
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;</em></ins></span>
-    unauthorized people can <span class="removed"><del><strong>remotely 
control it&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Samsung claims</strong></del></span> <span 
class="inserted"><ins><em>remotely control it&lt;/a&gt;.&lt;/p&gt;
+    
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+    unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
     problem is partly the fault of app developers. That is clearly true
@@ -795,35 +777,50 @@
     later the company updated the firmware to disallow
     interoperability&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build it,
-    it is cleverly serving its manufacturer &lt;em&gt;against 
you&lt;/em&gt;.&lt;/p&gt;
+    &lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build 
it,</em></ins></span>
+    it is <span class="inserted"><ins><em>cleverly serving its manufacturer 
&lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-    Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
+    Some D-Link routers&lt;/a&gt; have</em></ins></span> a <span 
class="removed"><del><strong>reference</strong></del></span> <span 
class="inserted"><ins><em>back door</em></ins></span> for <span 
class="removed"><del><strong>the facts.
+&lt;/p&gt;
+
+&lt;p&gt;Every Bluray disk (with few, rare exceptions)</strong></del></span> 
<span class="inserted"><ins><em>changing settings in a
     dlink of an eye.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt; The 
TP-Link
-    router has a back door&lt;/a&gt;.&lt;/p&gt;
+    router</em></ins></span> has <span 
class="removed"><del><strong>DRM&mdash;so
+don't use Bluray disks!&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li id="cameras-bugs"&gt;
+&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>a back door&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models of
-    routers have back doors&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models</em></ins></span> of <span 
class="removed"><del><strong>network-connected surveillance 
cameras</strong></del></span>
+    <span class="inserted"><ins><em>routers</em></ins></span> have <span 
class="inserted"><ins><em>back doors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+security bugs that allow anyone</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
+    to <span class="removed"><del><strong>watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511198"&gt;
-    &lt;p&gt;ARRIS cable modem has a &lt;a
-    
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511198"&gt;
+    &lt;p&gt;ARRIS cable modem</em></ins></span> has a <span 
class="removed"><del><strong>big security hole;</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized people</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
     back door in the back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -832,7 +829,9 @@
     sounds to be picked up by proprietary malware running
     on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and other &lt;a
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>remotely control it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Samsung claims</strong></del></span> <span 
class="inserted"><ins><em>correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1332,7 +1331,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/13 12:31:16 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-appliances.de.po    13 Sep 2019 12:31:16 -0000      1.79
+++ malware-appliances.de.po    18 Sep 2019 16:01:41 -0000      1.80
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -146,10 +146,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -285,9 +285,21 @@
 "nutzbar</a>.</ins>"
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- malware-appliances.fr.po    15 Sep 2019 12:48:10 -0000      1.130
+++ malware-appliances.fr.po    18 Sep 2019 16:01:41 -0000      1.131
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-13 14:48+0200\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -137,11 +138,22 @@
 "peut en faire autant, et peut également falsifier les vidéos</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Une vulnérabilité à des attaques de tiers est vraisemblablement 
involontaire "
 "et je suppose qu'Amazon la corrigera. Cependant je ne m'attends pas à ce "
@@ -345,9 +357,21 @@
 "traqueurs existants ont cessé de fonctionner pour toujours</a>."
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- malware-appliances.pot      13 Sep 2019 12:31:16 -0000      1.64
+++ malware-appliances.pot      18 Sep 2019 16:01:41 -0000      1.65
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -103,10 +103,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a "
-"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
-"to watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -235,7 +235,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- malware-appliances.ru.po    13 Sep 2019 17:28:51 -0000      1.165
+++ malware-appliances.ru.po    18 Sep 2019 16:01:41 -0000      1.166
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-12-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -140,11 +141,22 @@
 "видеоизображение</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Уязвимость третьей стороны, 
предположительно, была непреднамеренной, и 
я "
 "полагаю, в Amazon это исправят. Но я не думаю, 
что Amazon изменит устройство "
@@ -347,9 +359,21 @@
 "\">Все существующие устройства навсегда 
прекратили работу.</a>"
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-cars.de-diff.html   16 Sep 2019 08:31:26 -0000      1.31
+++ malware-cars.de-diff.html   18 Sep 2019 16:01:41 -0000      1.32
@@ -195,34 +195,36 @@
     &lt;p&gt;&lt;a</em></ins></span>
     
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969"&gt;
     Audi's proprietary software used a simple method to cheat on emissions
-    tests&lt;/a&gt;: to activate a special low-emission gearshifting mode until
-    the first time the car made a <span class="removed"><del><strong>turn.
+    tests&lt;/a&gt;: to activate a <span class="removed"><del><strong>special 
low-emission gearshifting mode until the
+first time the car made a turn.
 &lt;/li&gt;
   
 &lt;li&gt;
 &lt;p&gt;Caterpillar vehicles come with a &lt;a
 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;
-back-door to shutoff the engine&lt;/a&gt; 
remotely.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+back-door to shutoff the engine&lt;/a&gt; remotely.&lt;/p&gt;
+&lt;/li&gt;
   
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;&lt;a
 href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
-Volkswagen programmed its car engine computers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201608110"&gt;
-    &lt;p&gt;Due</em></ins></span> to <span 
class="removed"><del><strong>detect the
+Volkswagen programmed its car engine computers to detect the
 Environmental Protection Agency's emission tests&lt;/a&gt;,
-and run dirty</strong></del></span> <span class="inserted"><ins><em>weak 
security, &lt;a
-    
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
-    is easy to open</em></ins></span> the <span 
class="removed"><del><strong>rest</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> of <span 
class="removed"><del><strong>the time.&lt;/p&gt;
+and run dirty the rest of the time.&lt;/p&gt;
 
-&lt;p&gt;In real driving, the</strong></del></span> <span 
class="inserted"><ins><em>100 million</em></ins></span> cars <span 
class="removed"><del><strong>exceeded emissions standards</strong></del></span> 
<span class="inserted"><ins><em>built</em></ins></span> by <span 
class="removed"><del><strong>a factor
+&lt;p&gt;In real driving, the cars exceeded emissions standards by a factor
 of up to 35.&lt;/p&gt;
 
 &lt;p&gt;Using free software would not have stopped Volkswagen from
-programming it this way, but would have made it harder to 
conceal.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>Volkswagen&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+programming it this way, but would have</strong></del></span> <span 
class="inserted"><ins><em>special low-emission gearshifting mode until
+    the first time the car</em></ins></span> made <span 
class="removed"><del><strong>it harder</strong></del></span> <span 
class="inserted"><ins><em>a turn.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201608110"&gt;
+    &lt;p&gt;Due to weak security, &lt;a
+    
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
+    is easy</em></ins></span> to <span 
class="removed"><del><strong>conceal.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>open the doors of 100 million cars built by
+    Volkswagen&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
 <span class="removed"><del><strong>&lt;li&gt;
@@ -285,10 +287,12 @@
     could track the car, start or stop the engine, and activate or
     deactivate the brakes, and more.&lt;/p&gt;
 
-    &lt;p&gt;I expect that Chrysler and the NSA can do this too.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;I</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;We</em></ins></span> expect that 
Chrysler and the NSA can do this too.&lt;/p&gt;
 
-    &lt;p&gt;If I ever own a car, and it contains a portable phone, I will
-    deactivate that.&lt;/p&gt;
+    &lt;p&gt;If <span class="removed"><del><strong>I 
ever</strong></del></span> <span 
class="inserted"><ins><em>you</em></ins></span> own a <span 
class="removed"><del><strong>car, and it</strong></del></span> <span 
class="inserted"><ins><em>car that</em></ins></span> contains a <span 
class="removed"><del><strong>portable phone, I will</strong></del></span> <span 
class="inserted"><ins><em>phone modem, it would be a good
+    idea to</em></ins></span> deactivate <span 
class="removed"><del><strong>that.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>this.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
@@ -416,7 +420,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/16 08:31:26 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-cars.de.po  16 Sep 2019 08:31:26 -0000      1.21
+++ malware-cars.de.po  18 Sep 2019 16:01:41 -0000      1.22
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -484,13 +484,23 @@
 "\"tn01-ref\" class=\"transnote\">[1]</a>"
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "<ins>Vorstellbar wäre</ins>, dass Chrysler und NSA dies auch können."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "<ins>Wäre ein Fahrzeug serienmäßig mit „Infotainmentsystem“ 
ausgestattet, "
 "sollte es besser grundsätzlich deaktiviert werden.</ins>"

Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-cars.fr.po  16 Sep 2019 11:42:11 -0000      1.34
+++ malware-cars.fr.po  18 Sep 2019 16:01:41 -0000      1.35
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-16 13:39+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -434,13 +435,23 @@
 "activer et désactiver les freins, et plus encore."
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "J'imagine que Chrysler et la NSA peuvent faire de même."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "Si un jour je possède une voiture et qu'elle contient un téléphone 
portable, "
 "je le désactiverai."

Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-cars.pot    16 Sep 2019 08:31:26 -0000      1.16
+++ malware-cars.pot    18 Sep 2019 16:01:41 -0000      1.17
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -295,13 +295,13 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- malware-cars.ru.po  16 Sep 2019 09:00:24 -0000      1.40
+++ malware-cars.ru.po  18 Sep 2019 16:01:41 -0000      1.41
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-09-27 04:21-0500\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -427,13 +428,23 @@
 "отпускать тормоза и т.д."
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "Я думаю, что Крайслер и АНБ тоже это 
могут."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "Если у меня когда-нибудь будет машина и в 
ней будет мобильный телефон, я его "
 "выключу."

Index: malware-games.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-games.de-diff.html  11 Sep 2019 08:01:15 -0000      1.34
+++ malware-games.de-diff.html  18 Sep 2019 16:01:41 -0000      1.35
@@ -133,7 +133,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -438,7 +438,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/11 08:01:15 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-games.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-games.de.po 11 Sep 2019 08:01:15 -0000      1.35
+++ malware-games.de.po 18 Sep 2019 16:01:41 -0000      1.36
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-11 07:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-12-05 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -216,7 +216,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: malware-games.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-games.fr.po 11 Sep 2019 09:34:19 -0000      1.59
+++ malware-games.fr.po 18 Sep 2019 16:01:41 -0000      1.60
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-09-11 07:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-11 11:32+0200\n"
 "Last-Translator: Tom Mounet <tom.m.mounet AT gmail.com>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -246,8 +247,15 @@
 "d'écouter les enregistrements</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Du point de vue éthique, je ne vois aucune différence entre l'écoute par 
des "

Index: malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-games.ja-diff.html  11 Sep 2019 08:01:15 -0000      1.42
+++ malware-games.ja-diff.html  18 Sep 2019 16:01:41 -0000      1.43
@@ -133,7 +133,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -438,7 +438,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/11 08:01:15 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-games.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-games.ja.po 11 Sep 2019 08:01:15 -0000      1.35
+++ malware-games.ja.po 18 Sep 2019 16:01:41 -0000      1.36
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-09-11 07:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -199,7 +199,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: malware-games.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-games.pot   11 Sep 2019 08:01:15 -0000      1.29
+++ malware-games.pot   18 Sep 2019 16:01:41 -0000      1.30
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-09-11 07:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -181,7 +181,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-games.ru.po 11 Sep 2019 14:29:06 -0000      1.71
+++ malware-games.ru.po 18 Sep 2019 16:01:41 -0000      1.72
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-09-11 07:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-11-09 16:08+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -244,8 +245,15 @@
 "прослушивать записи</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Я не вижу моральной разницы между 
прослушиванием работниками-людьми и "

Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-google.de-diff.html 13 Sep 2019 12:31:16 -0000      1.38
+++ malware-google.de-diff.html 18 Sep 2019 16:01:41 -0000      1.39
@@ -483,18 +483,18 @@
   &lt;/li&gt;
   
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola phones modify Android to</strong></del></span>
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers</em></ins></span> send 
<span class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot 
of</em></ins></span>
+    data <span class="removed"><del><strong>to 
Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308040"&gt;
-    &lt;p&gt;Google Chrome</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+    &lt;p&gt;Google Chrome &lt;a
+    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
     spies on browser history, affiliations&lt;/a&gt;, and other installed
     software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -506,7 +506,8 @@
     Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
+    and <span class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably</em></ins></span> 
Windows <span class="removed"><del><strong>laptops.)</strong></del></span> 
<span class="inserted"><ins><em>laptops).</em></ins></span>  Here is &lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
@@ -673,7 +674,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/13 12:31:16 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-google.de.po        13 Sep 2019 12:31:17 -0000      1.53
+++ malware-google.de.po        18 Sep 2019 16:01:41 -0000      1.54
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -861,7 +861,13 @@
 "Software aus."
 
 #. type: Content of: <ul><li><p>
-# || No change detected.  The change might only be in amounts of spaces.
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
 #, fuzzy
 #| msgid ""
 #| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
@@ -876,9 +882,9 @@
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Spionageprogramme in Android-Telefonen (und „Windows-Laptops“?): Die "
 "amerikanische Tageszeitung <span xml:lang=\"en\" lang=\"en\">The Wall Street "

Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-google.es.po        15 Sep 2019 21:06:07 -0000      1.35
+++ malware-google.es.po        18 Sep 2019 16:01:41 -0000      1.36
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-13 10:33-0400\n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2\n"
 
@@ -787,14 +788,30 @@
 "software instalado."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#| "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
 "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Software espía en teléfonos Android (¿y en portátiles con Windows?): The "
 "Wall Street Journal (en un artículo al que solo se puede acceder previo "

Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-google.fr.po        15 Sep 2019 12:48:10 -0000      1.93
+++ malware-google.fr.po        18 Sep 2019 16:01:41 -0000      1.94
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-13 14:48+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -790,14 +791,30 @@
 "autres logiciels installés."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#| "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
 "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Des logiciels espions dans les téléphones Android et les ordinateurs "
 "portables (sous Windows ?) : le <cite>Wall Street Journal</cite> (dans un "

Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- malware-google.pot  13 Sep 2019 12:31:18 -0000      1.49
+++ malware-google.pot  18 Sep 2019 16:01:41 -0000      1.50
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -543,7 +543,7 @@
 "(in an article blocked from us by a paywall) reports that <a "
 
"href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
 "
 "the FBI can remotely activate the GPS and microphone in Android phones and "
-"laptops</a>.  (I suspect this means Windows laptops.)  Here is <a "
+"laptops</a> (presumably Windows laptops).  Here is <a "
 "href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>."
 msgstr ""
 

Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- malware-google.ru.po        13 Sep 2019 17:28:51 -0000      1.107
+++ malware-google.ru.po        18 Sep 2019 16:01:41 -0000      1.108
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-10-05 09:03+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -785,14 +786,30 @@
 "a> и за другими установленными 
программами."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#| "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
 "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Шпионские программы в телефонах Android (и 
портативных компьютерах [с "
 "Windows?]): &ldquo;Уолл-стрит джорнел&rdquo; (в 
статье, закрытой от нас "

Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-microsoft.de-diff.html      11 Sep 2019 08:31:52 -0000      1.45
+++ malware-microsoft.de-diff.html      18 Sep 2019 16:01:41 -0000      1.46
@@ -585,7 +585,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -926,7 +926,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/11 08:31:52 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- malware-microsoft.de.po     11 Sep 2019 08:31:52 -0000      1.141
+++ malware-microsoft.de.po     18 Sep 2019 16:01:41 -0000      1.142
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -896,7 +896,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- malware-microsoft.es.po     15 Sep 2019 21:06:07 -0000      1.155
+++ malware-microsoft.es.po     18 Sep 2019 16:01:41 -0000      1.156
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 
 #. type: Content of: <title>
@@ -770,8 +771,15 @@
 "grabaciones</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Desde el punto de vista moral no veo ninguna diferencia entre tener "

Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- malware-microsoft.fr.po     11 Sep 2019 09:34:19 -0000      1.175
+++ malware-microsoft.fr.po     18 Sep 2019 16:01:41 -0000      1.176
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-11 11:32+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -768,8 +769,15 @@
 "d'écouter les enregistrements</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Du point de vue éthique, je ne vois aucune différence entre l'écoute par 
des "

Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-microsoft.it-diff.html      11 Sep 2019 08:31:52 -0000      1.45
+++ malware-microsoft.it-diff.html      18 Sep 2019 16:01:41 -0000      1.46
@@ -440,7 +440,7 @@
   &lt;li id="M201606270"&gt;
     &lt;p id="windows10-forcing"&gt;In its efforts to trick users of Windows
     7 and 8 into installing all-spying Windows 10 against their
-    will, Microsoft forced their computers to &lt;a
+    will,</em></ins></span> Microsoft <span class="inserted"><ins><em>forced 
their computers to &lt;a
     
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
     silently download&hellip; the whole of Windows 10&lt;/a&gt;! Apparently,
     this was done through a &lt;a
@@ -471,7 +471,7 @@
     for its USB-to-serial chips has been designed to &lt;a
     
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
     alternative compatible chips&lt;/a&gt;
-    so that they no longer work.</em></ins></span> Microsoft <span 
class="inserted"><ins><em>is &lt;a
+    so that they no longer work. Microsoft is &lt;a
     
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
     this automatically&lt;/a&gt; as an &ldquo;upgrade&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
@@ -522,10 +522,10 @@
 &lt;li&gt;In order to increase Windows 10's install base, Microsoft
 &lt;a
 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-blatantly disregards user choice and privacy&lt;/a&gt;.
-&lt;/li&gt;
+blatantly disregards user choice and privacy&lt;/a&gt;.</strong></del></span> 
<span class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;Microsoft has
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Microsoft has
 started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging
 users obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
@@ -536,10 +536,9 @@
 
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
 into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed 
by</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed 
by</strong></del></span>
 
-  &lt;li id="M201306220"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201306220"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;Microsoft
     informs</em></ins></span> the
@@ -573,7 +572,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -914,7 +913,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/11 08:31:52 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- malware-microsoft.it.po     11 Sep 2019 08:31:53 -0000      1.147
+++ malware-microsoft.it.po     18 Sep 2019 16:01:41 -0000      1.148
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:06+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -847,7 +847,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-microsoft.ja-diff.html      11 Sep 2019 08:31:53 -0000      1.57
+++ malware-microsoft.ja-diff.html      18 Sep 2019 16:01:41 -0000      1.58
@@ -548,7 +548,7 @@
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -893,7 +893,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/11 08:31:53 $
+$Date: 2019/09/18 16:01:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- malware-microsoft.ja.po     11 Sep 2019 08:31:53 -0000      1.124
+++ malware-microsoft.ja.po     18 Sep 2019 16:01:42 -0000      1.125
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -697,7 +697,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-microsoft.pot       11 Sep 2019 08:31:53 -0000      1.85
+++ malware-microsoft.pot       18 Sep 2019 16:01:42 -0000      1.86
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -520,7 +520,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- malware-microsoft.ru.po     11 Sep 2019 14:29:06 -0000      1.217
+++ malware-microsoft.ru.po     18 Sep 2019 16:01:42 -0000      1.218
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-11-20 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -764,8 +765,15 @@
 "прослушивать записи</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Я не вижу моральной разницы между 
прослушиванием работниками-людьми и "

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.de-diff.html        18 Sep 2019 10:02:31 -0000      1.65
+++ malware-mobiles.de-diff.html        18 Sep 2019 16:01:42 -0000      1.66
@@ -681,7 +681,7 @@
     being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
@@ -726,8 +726,8 @@
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
@@ -1423,7 +1423,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- malware-mobiles.de.po       18 Sep 2019 10:02:31 -0000      1.122
+++ malware-mobiles.de.po       18 Sep 2019 16:01:42 -0000      1.123
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1081,7 +1081,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -1143,9 +1143,15 @@
 msgstr "Das macht sie zu Spionen bei der Durchsetzung von Lizenzen."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Ich [RMS] erwarte, dass es auch DRM umsetzt&#160;&#8209;&#160;dass es keine "
 "Möglichkeit gibt, eine Aufzeichnung zu speichern. Dem Artikel nach kann man "

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- malware-mobiles.es.po       18 Sep 2019 10:02:31 -0000      1.147
+++ malware-mobiles.es.po       18 Sep 2019 16:01:42 -0000      1.148
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -1070,8 +1070,16 @@
 "que se le exige que notifique a los usuarios qué va a hacer con los datos."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -1161,9 +1169,15 @@
 "de las licencias."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Supongo que también implementa el DRM, que no hay manera de guardar una "
 "grabación, aunque no puedo estar seguro a partir de lo que dice el 
artículo."

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- malware-mobiles.fr.po       18 Sep 2019 10:48:29 -0000      1.172
+++ malware-mobiles.fr.po       18 Sep 2019 16:01:42 -0000      1.173
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-18 12:48+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -1077,8 +1078,16 @@
 "données."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -1164,9 +1173,15 @@
 "Ainsi elle fait office d'espionne au service de l'application des licences."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Je suppose qu'elle implémente aussi la gestion numérique des restrictions 
– "
 "qu'il n'y a aucun moyen de sauvegarder un enregistrement. Mais je ne peux "

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-mobiles.it-diff.html        18 Sep 2019 10:02:31 -0000      1.70
+++ malware-mobiles.it-diff.html        18 Sep 2019 16:01:42 -0000      1.71
@@ -713,7 +713,7 @@
     being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
@@ -758,8 +758,8 @@
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
@@ -1461,7 +1461,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- malware-mobiles.it.po       18 Sep 2019 10:02:31 -0000      1.122
+++ malware-mobiles.it.po       18 Sep 2019 16:01:42 -0000      1.123
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1032,7 +1032,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -1092,8 +1092,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- malware-mobiles.ja-diff.html        18 Sep 2019 10:02:31 -0000      1.86
+++ malware-mobiles.ja-diff.html        18 Sep 2019 16:01:42 -0000      1.87
@@ -674,7 +674,7 @@
     being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
@@ -719,8 +719,8 @@
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
@@ -1304,7 +1304,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- malware-mobiles.ja.po       18 Sep 2019 10:02:31 -0000      1.112
+++ malware-mobiles.ja.po       18 Sep 2019 16:01:42 -0000      1.113
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -830,7 +830,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -890,8 +890,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- malware-mobiles.pot 18 Sep 2019 10:02:31 -0000      1.88
+++ malware-mobiles.pot 18 Sep 2019 16:01:42 -0000      1.89
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -711,7 +711,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -772,8 +772,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- malware-mobiles.ru.po       18 Sep 2019 14:29:41 -0000      1.206
+++ malware-mobiles.ru.po       18 Sep 2019 16:01:42 -0000      1.207
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -1058,8 +1059,16 @@
 "делать с этими данными."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -1146,9 +1155,15 @@
 msgstr "Таким образом, они шпионят в 
лицензионных целях."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Я не удивлюсь, если в нем реализовано и 
цифровое управление "
 "ограничениями&nbsp;&mdash; т.е. сохранить 
запись невозможно. Но из статьи "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- nl.po       18 Sep 2019 10:02:31 -0000      1.143
+++ nl.po       18 Sep 2019 16:01:42 -0000      1.144
@@ -492,10 +492,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2098,7 +2098,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -3174,13 +3174,13 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -3371,7 +3371,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 
@@ -4152,9 +4152,9 @@
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -5542,7 +5542,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -5602,8 +5602,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- pl.po       18 Sep 2019 10:02:31 -0000      1.142
+++ pl.po       18 Sep 2019 16:01:42 -0000      1.143
@@ -436,10 +436,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1634,7 +1634,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -2709,13 +2709,13 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2905,7 +2905,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 
@@ -3600,9 +3600,9 @@
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -4873,7 +4873,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -4933,8 +4933,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- pot 18 Sep 2019 10:02:31 -0000      1.141
+++ pot 18 Sep 2019 16:01:42 -0000      1.142
@@ -381,10 +381,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1482,7 +1482,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -2539,13 +2539,13 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2726,7 +2726,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 
@@ -3410,9 +3410,9 @@
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -4665,7 +4665,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -4725,8 +4725,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-insecurity.de-diff.html 13 Sep 2019 12:31:18 -0000      1.32
+++ proprietary-insecurity.de-diff.html 18 Sep 2019 16:01:42 -0000      1.33
@@ -140,25 +140,26 @@
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>many 
Internet</strong></del></span> <span class="inserted"><ins><em>Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
-    href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
+    &lt;p&gt;Users caught in the jail</em></ins></span> of <span 
class="removed"><del><strong>Stings devices
+    allows</strong></del></span> <span class="inserted"><ins><em>an iMonster 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html"&gt;
 sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
+    inexcusable even if it didn't lead</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>security threats as well.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903210"&gt;
     &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
     
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
     two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+    defibrillators&lt;/a&gt; and</em></ins></span> the <span 
class="removed"><del><strong>people</strong></del></span> <span 
class="inserted"><ins><em>devices they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
     vulnerabilities were discovered in an earlier Medtronics communication
@@ -168,13 +169,15 @@
   &lt;/li&gt;
 
   &lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
-    manufacturer (now Amazon) can watch all the time. Now it turns out
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed 
so</em></ins></span> that <span class="removed"><del><strong>use 
them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be a sucker&mdash;reject</strong></del></span> <span 
class="inserted"><ins><em>the
+    manufacturer (now Amazon) can watch</em></ins></span> all the <span 
class="removed"><del><strong>stings.&lt;/p&gt;
+  &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>time. Now 
it turns out
     that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The third party vulnerability is presumably
-    unintentional and I suppose Amazon will fix it. I
+    &lt;p&gt;The third party vulnerability</em></ins></span> is <span 
class="removed"><del><strong>unfortunate</strong></del></span> <span 
class="inserted"><ins><em>presumably
+    unintentional and Amazon will probably fix it. However, we
     do not expect Amazon to change the design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
@@ -183,36 +186,45 @@
   &lt;li id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
+    hide voice commands in other audio&lt;/a&gt;, so</em></ins></span> that 
<span class="inserted"><ins><em>people cannot hear
     them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    &lt;p&gt;Crackers found a way to break</em></ins></span> the <span 
class="removed"><del><strong>article uses</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span 
class="removed"><del><strong>term</strong></del></span> <span 
class="inserted"><ins><em>US
     told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a
+     <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize"&gt;
+     &ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201807100"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201807100"&gt;</em></ins></span>
     &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201807020"&gt;
+  &lt;li <span class="removed"><del><strong>id="break-security-smarttv"&gt;
+  &lt;p&gt;&lt;a
+       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+      Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera</strong></del></span> <span 
class="inserted"><ins><em>id="M201807020"&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
+    photos</em></ins></span> to <span class="removed"><del><strong>watch 
the</strong></del></span> people <span class="removed"><del><strong>who are 
watching TV.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Many models</strong></del></span> <span 
class="inserted"><ins><em>in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712240"&gt;
@@ -256,51 +268,72 @@
   &lt;/li&gt;
 
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security</em></ins></span> in many Internet of Stings 
devices allows &lt;a
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
     to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that the article uses the term &lt;a
-     <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize"&gt;
-     &ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be
-  &lt;a
-href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
-  hijacked by programs that play commands in ultrasound that humans can't
-  hear&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="break-security-smarttv"&gt;
-  &lt;p&gt;&lt;a
-       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-      Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
-      to watch the people who are watching TV.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201706200.1"&gt;</em></ins></span>
-    &lt;p&gt;Many models of Internet-connected cameras &lt;a
+  &lt;li id="M201706200.1"&gt;
+    &lt;p&gt;Many models</em></ins></span> of Internet-connected cameras &lt;a
     href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
     have backdoors&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;That is a malicious functionality, but in addition it
-    is <span class="removed"><del><strong>a gross
-  insecurity since anyone, including malicious crackers,</strong></del></span> 
<span class="inserted"><ins><em>a gross insecurity since anyone, including 
malicious crackers, &lt;a
+    is a gross insecurity since anyone, including malicious crackers, &lt;a
     
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
     find those accounts and use them to get into users' 
cameras&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201706050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;
+    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+    pre-installed on 28 models of HP laptops logged the user's
+    keystroke to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201706050"&gt;
     &lt;p id="intel-me-10-year-vulnerability"&gt;Intel's
-    CPU backdoor&mdash;the Intel Management Engine&mdash;had a &lt;a
+    CPU backdoor&mdash;the Intel Management Engine&mdash;had</em></ins></span> 
a <span class="removed"><del><strong>file in the filesystem. Any process with 
access</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major
     security vulnerability for 10 years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The vulnerability allowed a cracker to access
-    the computer's Intel Active Management Technology (AMT) &lt;a
+    &lt;p&gt;The vulnerability allowed a cracker</em></ins></span> to
+    <span class="removed"><del><strong>the filesystem or the MapViewOfFile API 
could gain</strong></del></span> access <span 
class="removed"><del><strong>to</strong></del></span>
+    the
+    <span class="removed"><del><strong>log. Furthermore, &lt;a 
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
+    to modzero&lt;/a&gt; the &ldquo;information-leak via Covert Storage
+    Channel enables malware authors to capture keystrokes without
+    taking the risk of being classified as malicious task by AV
+    heuristics&rdquo;.
+  &lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
+medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+
+&lt;li&gt;
+  &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
+       and then leaked by the Shadowbrokers group, are now being used to
+       &lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
+       of Windows computers with ransomware&lt;/a&gt;.
+       &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li  id="intel-me-10-year-vulnerability"&gt;
+  &lt;p&gt;Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a
+       &lt;a 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major
 security
+       vulnerability for 10 years&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The vulnerability allowed a cracker to access the computer's Intel 
Active
+      Management Technology
+      (AMT)</strong></del></span> <span class="inserted"><ins><em>computer's 
Intel Active Management Technology (AMT)</em></ins></span> &lt;a
     
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
     web interface with an empty password and gave administrative
     access&lt;/a&gt; to access the computer's keyboard, mouse, monitor among
@@ -312,67 +345,34 @@
     besides using machines that don't come with the backdoor.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201705250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;
     &lt;p&gt;The proprietary code that runs pacemakers,
-    insulin pumps, and other medical devices is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find those accounts and use them to get into
-  users' cameras&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full of gross
-    security faults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    insulin pumps, and other medical devices is &lt;a
+    href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
+    security faults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;
-    Conexant</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705160"&gt;
-    &lt;p&gt;Conexant</em></ins></span> HD Audio Driver Package (version 
1.0.0.46 and earlier)
+  &lt;li id="M201705160"&gt;
+    &lt;p&gt;Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
     pre-installed on 28 models of HP laptops logged the user's keystroke
     to a file in the filesystem. Any process with access to the filesystem
     or the MapViewOfFile API could gain access to the log. Furthermore, &lt;a
     
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
     to modzero&lt;/a&gt; the &ldquo;information-leak via Covert Storage Channel
     enables malware authors to capture keystrokes without taking the risk
-    of being classified as malicious task by AV
-    <span class="removed"><del><strong>heuristics&rdquo;.
-  &lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>heuristics&rdquo;.&lt;/p&gt;</em></ins></span>
+    of being classified as malicious task by AV heuristics&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705120"&gt;</em></ins></span>
+  &lt;li id="M201705120"&gt;
     &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
     and then leaked by the Shadowbrokers group, are now being used to &lt;a
     
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
-    a great number of Windows computers with <span 
class="removed"><del><strong>ransomware&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ransomware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    a great number of Windows computers with ransomware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li  <span 
class="removed"><del><strong>id="intel-me-10-year-vulnerability"&gt;
-  &lt;p&gt;Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a
-       &lt;a 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major
 security
-       vulnerability for 10 years&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The vulnerability allowed a cracker to access the computer's Intel 
Active
-      Management Technology
-      (AMT) &lt;a 
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
-      web interface with an empty password and gave administrative
-      access&lt;/a&gt; to access the computer's keyboard, mouse, monitor
-      among other privileges.&lt;/p&gt;
-
-       &lt;p&gt;It does not help that in newer Intel processors, it is 
impossible
-       to turn off the Intel Management Engine. Thus, even users who are 
-       proactive about their security can do nothing to protect themselves 
-       besides using machines that don't come with the backdoor.&lt;/p&gt;
-
-&lt;/li&gt;
-
-&lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201704050"&gt;</em></ins></span>
+  &lt;li id="M201704050"&gt;</em></ins></span>
     &lt;p&gt;Many Android devices &lt;a
     
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
     can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
@@ -385,9 +385,7 @@
     &lt;p&gt;When Miele's Internet of
     Stings hospital disinfectant dishwasher is &lt;a
     
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected to the <span class="removed"><del><strong>Internet, its security 
is crap&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;For example,</strong></del></span> <span 
class="inserted"><ins><em>Internet, its security is crap&lt;/a&gt;.&lt;/p&gt;
+    connected to the Internet, its security is crap&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For example, a cracker can gain access to the dishwasher's
     filesystem, infect it with malware, and force the dishwasher to launch
@@ -395,9 +393,12 @@
     used in hospitals, such attacks could potentially put hundreds of
     lives at risk.&lt;/p&gt;
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;WhatsApp 
has</strong></del></span>
 
-  &lt;li id="M201702200"&gt;
-    &lt;p&gt;If you buy a used &ldquo;smart&rdquo;
+  <span class="inserted"><ins><em>&lt;li id="M201702200"&gt;
+    &lt;p&gt;If you buy</em></ins></span> a <span 
class="removed"><del><strong>feature that 
+    &lt;a 
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
+      has been described</strong></del></span> <span 
class="inserted"><ins><em>used &ldquo;smart&rdquo;
     car, house, TV, refrigerator, etc., usually &lt;a
     
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
     previous owners can still remotely control it&lt;/a&gt;.&lt;/p&gt;
@@ -408,20 +409,17 @@
     
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
     a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is in addition to the fact that the car 
contains</em></ins></span> a <span class="removed"><del><strong>cracker can 
gain access to</strong></del></span> <span class="inserted"><ins><em>cellular
-    modem that tells big brother all</em></ins></span> the <span 
class="removed"><del><strong>dishwasher's filesystem, 
-infect</strong></del></span> <span class="inserted"><ins><em>time 
where</em></ins></span> it <span class="removed"><del><strong>with malware, and 
force</strong></del></span> <span class="inserted"><ins><em>is.  If you own
-    such a car, it would be wise to disconnect</em></ins></span> the <span 
class="removed"><del><strong>dishwasher</strong></del></span> <span 
class="inserted"><ins><em>modem so as</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on other
-devices in</strong></del></span> <span class="inserted"><ins><em>turn
-    off</em></ins></span> the <span class="removed"><del><strong>network. 
Since these dishwashers</strong></del></span> <span 
class="inserted"><ins><em>tracking.&lt;/p&gt;
+    &lt;p&gt;This is in addition to the fact that the car contains a cellular
+    modem that tells big brother all the time where it is.  If you own
+    such a car, it would be wise to disconnect the modem so as to turn
+    off the tracking.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701271"&gt;
     &lt;p&gt;A cracker would be able to &lt;a
     href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/"&gt;
     turn the Oculus Rift sensors into spy cameras&lt;/a&gt; after breaking into
-    the computer they</em></ins></span> are <span 
class="removed"><del><strong>used in hospitals, such
-attacks could potentially put hundreds of lives at 
risk.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>connected 
to.&lt;/p&gt;
+    the computer they are connected to.&lt;/p&gt;
 
     &lt;p&gt;Unfortunately, the article &lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;improperly refers to 
crackers
@@ -432,14 +430,13 @@
     &lt;p&gt;Samsung phones &lt;a
     
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
     a security hole that allows an SMS message to install
-    ransomware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    ransomware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;WhatsApp</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201701130"&gt;
-    &lt;p&gt;WhatsApp</em></ins></span> has a feature that &lt;a
+  &lt;li id="M201701130"&gt;
+    &lt;p&gt;WhatsApp has a feature that &lt;a
     
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
-    has been described as a &ldquo;back door&rdquo;&lt;/a&gt; because it would
+    has been described</em></ins></span> as a &ldquo;back 
door&rdquo;&lt;/a&gt; because it would
     enable governments to nullify its encryption.&lt;/p&gt;
 
     &lt;p&gt;The developers say that it wasn't intended as a back door, and 
that
@@ -553,22 +550,20 @@
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201606290"&gt;</em></ins></span>
-    &lt;p&gt;Antivirus programs have so many errors that &lt;a <span 
class="removed"><del><strong>href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
-  may make security worse&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Over 70 brands of network-connected surveillance
-cameras &lt;a 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;have
-security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
+    &lt;p&gt;Antivirus programs have so many errors that &lt;a
+    
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
     may make security worse&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;GNU/Linux does not need antivirus 
software.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Over 70 brands of network-connected surveillance
+cameras &lt;a 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;have
+security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
 &lt;p&gt;
 Samsung's</strong></del></span>
 
@@ -690,24 +685,22 @@
   <span class="inserted"><ins><em>&lt;li id="M201510200"&gt;
     &lt;p&gt;&ldquo;Self-encrypting&rdquo;</em></ins></span> disk drives
     do the encryption with proprietary firmware so you
-    can't trust it.  Western Digital's <span 
class="removed"><del><strong>&ldquo;My Passport&rdquo;
-drives
-&lt;a 
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have
 a back door&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+    have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Mac OS X had an
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&ldquo;My 
Passport&rdquo; drives &lt;a
-    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-    have a back door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508120"&gt;</em></ins></span>
     &lt;p&gt;Security researchers discovered a &lt;a
@@ -733,13 +726,13 @@
 &lt;p&gt;
 I</strong></del></span> <span class="inserted"><ins><em>more.&lt;/p&gt;
 
-    &lt;p&gt;I</em></ins></span> expect that Chrysler and the NSA can do this 
<span class="removed"><del><strong>too.
+    &lt;p&gt;We</em></ins></span> expect that Chrysler and the NSA can do this 
<span class="removed"><del><strong>too.
 &lt;/p&gt;
 &lt;p&gt;
-If</strong></del></span> <span class="inserted"><ins><em>too.&lt;/p&gt;
+If I ever</strong></del></span> <span class="inserted"><ins><em>too.&lt;/p&gt;
 
-    &lt;p&gt;If</em></ins></span> I ever own a car, and it contains a portable 
phone, I will
-    deactivate <span class="removed"><del><strong>that.
+    &lt;p&gt;If you</em></ins></span> own a <span 
class="removed"><del><strong>car, and it</strong></del></span> <span 
class="inserted"><ins><em>car that</em></ins></span> contains a <span 
class="removed"><del><strong>portable phone, I will
+deactivate that.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -750,12 +743,13 @@
 &ldquo;&lt;a
 
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
 secure IP device I've ever seen&lt;/a&gt;&rdquo;
-by a security researcher.
+by</strong></del></span> <span class="inserted"><ins><em>phone modem, it would 
be</em></ins></span> a <span class="removed"><del><strong>security researcher.
 &lt;/p&gt;
 &lt;p&gt;
 Depending on what drug is being infused, the insecurity could
-open the door to murder.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that.&lt;/p&gt;</em></ins></span>
+open the door</strong></del></span> <span class="inserted"><ins><em>good
+    idea</em></ins></span> to <span class="removed"><del><strong>murder.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>deactivate 
this.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
@@ -1059,7 +1053,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/13 12:31:18 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary-insecurity.de.po        13 Sep 2019 12:31:18 -0000      1.135
+++ proprietary-insecurity.de.po        18 Sep 2019 16:01:42 -0000      1.136
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -223,10 +223,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1068,15 +1068,25 @@
 "\"tn01-ref\" class=\"transnote\">[1]</a>"
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "<ins>Vorstellbar wäre</ins>, dass Chrysler und NSA dies auch können."
 
 # Note: Author-related, self-centered, is rather uncommon in Germany without
 # attribution; therefore more generalized.
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "<ins>Wäre ein Fahrzeug serienmäßig mit „Infotainmentsystem“ 
ausgestattet, "
 "sollte es besser grundsätzlich deaktiviert werden.</ins>"

Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary-insecurity.es.po        15 Sep 2019 21:06:07 -0000      1.13
+++ proprietary-insecurity.es.po        18 Sep 2019 16:01:42 -0000      1.14
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-13 10:37-0400\n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2\n"
 
@@ -238,11 +239,22 @@
 "a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Es de suponer que la vulnerabilidad a terceros no es intencionada, e imagino "
 "que Amazon lo solucionará. Pero no cuento con que Amazon cambie el diseño "
@@ -949,13 +961,23 @@
 "o desactivar los frenos, entre otras cosas."
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "Es de suponer que Chrysler y la NSA también pueden hacerlo."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "Si se posee un automóvil que contiene un teléfono móvil, hay que "
 "desactivarlo."

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary-insecurity.fr.po        15 Sep 2019 12:48:10 -0000      1.178
+++ proprietary-insecurity.fr.po        18 Sep 2019 16:01:42 -0000      1.179
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-13 14:48+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -238,11 +239,22 @@
 "peut en faire autant, et peut également falsifier les vidéos</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Une vulnérabilité à des attaques de tiers est vraisemblablement 
involontaire "
 "et je suppose qu'Amazon la corrigera. Cependant je ne m'attends pas à ce "
@@ -951,13 +963,23 @@
 "activer et désactiver les freins, et plus encore."
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "J'imagine que Chrysler et la NSA peuvent faire de même."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "Si un jour je possède une voiture et qu'elle contient un téléphone 
portable, "
 "je le désactiverai."

Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary-insecurity.it-diff.html 13 Sep 2019 12:31:18 -0000      1.47
+++ proprietary-insecurity.it-diff.html 18 Sep 2019 16:01:42 -0000      1.48
@@ -172,7 +172,7 @@
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
-    unintentional and I suppose Amazon will fix it. I
+    unintentional and Amazon will probably fix it. However, we
     do not expect Amazon to change the design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
@@ -336,9 +336,8 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201703270"&gt;</em></ins></span>
     &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher is
-<span class="removed"><del><strong>&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
 <span class="inserted"><ins><em>&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    Stings hospital disinfectant dishwasher is &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
     connected to the Internet, its security is crap&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For example, a cracker can gain access to the dishwasher's
@@ -511,14 +510,15 @@
   <span class="inserted"><ins><em>&lt;li id="M201606290"&gt;</em></ins></span>
     &lt;p&gt;Antivirus programs have so many errors that &lt;a
     
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
-    may <span class="removed"><del><strong>make security 
worse&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>may make security 
worse&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;Over 70 brands of network-connected surveillance
 cameras &lt;a 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;have
-security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>make security worse&lt;/a&gt;.&lt;/p&gt;
+security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>may make security 
worse&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;GNU/Linux does not need antivirus 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -645,9 +645,9 @@
   <span class="inserted"><ins><em>&lt;li id="M201510200"&gt;
     &lt;p&gt;&ldquo;Self-encrypting&rdquo;</em></ins></span> disk drives
     do the encryption with proprietary firmware so you
-    can't trust it. <span class="removed"><del><strong>Western Digital's 
&ldquo;My Passport&rdquo;
-drives
-&lt;a 
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have
 a back door&lt;/a&gt;.
+    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+    have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -657,9 +657,7 @@
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;</strong></del></span>  <span class="inserted"><ins><em>Western 
Digital's &ldquo;My Passport&rdquo; drives &lt;a
-    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-    have a back door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
@@ -688,13 +686,13 @@
 &lt;p&gt;
 I</strong></del></span> <span class="inserted"><ins><em>more.&lt;/p&gt;
 
-    &lt;p&gt;I</em></ins></span> expect that Chrysler and the NSA can do this 
<span class="removed"><del><strong>too.
+    &lt;p&gt;We</em></ins></span> expect that Chrysler and the NSA can do this 
<span class="removed"><del><strong>too.
 &lt;/p&gt;
 &lt;p&gt;
-If</strong></del></span> <span class="inserted"><ins><em>too.&lt;/p&gt;
+If I ever</strong></del></span> <span class="inserted"><ins><em>too.&lt;/p&gt;
 
-    &lt;p&gt;If</em></ins></span> I ever own a car, and it contains a portable 
phone, I will
-    deactivate <span class="removed"><del><strong>that.
+    &lt;p&gt;If you</em></ins></span> own a <span 
class="removed"><del><strong>car, and it</strong></del></span> <span 
class="inserted"><ins><em>car that</em></ins></span> contains a <span 
class="removed"><del><strong>portable phone, I will
+deactivate that.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -705,12 +703,13 @@
 &ldquo;&lt;a
 
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
 secure IP device I've ever seen&lt;/a&gt;&rdquo;
-by a security researcher.
+by</strong></del></span> <span class="inserted"><ins><em>phone modem, it would 
be</em></ins></span> a <span class="removed"><del><strong>security researcher.
 &lt;/p&gt;
 &lt;p&gt;
 Depending on what drug is being infused, the insecurity could
-open the door to murder.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that.&lt;/p&gt;</em></ins></span>
+open the door</strong></del></span> <span class="inserted"><ins><em>good
+    idea</em></ins></span> to <span class="removed"><del><strong>murder.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>deactivate 
this.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
@@ -1014,7 +1013,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/13 12:31:18 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary-insecurity.it.po        13 Sep 2019 12:31:18 -0000      1.152
+++ proprietary-insecurity.it.po        18 Sep 2019 16:01:42 -0000      1.153
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -216,10 +216,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -991,13 +991,23 @@
 "Jeep."
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "Se si possiede un'automobile che contiene tra i suoi componenti un telefono "
 "cellulare, è opportuno considerare se disattivarlo."

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary-insecurity.ja-diff.html 13 Sep 2019 12:31:18 -0000      1.66
+++ proprietary-insecurity.ja-diff.html 18 Sep 2019 16:01:42 -0000      1.67
@@ -172,7 +172,7 @@
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
-    unintentional and I suppose Amazon will fix it. I
+    unintentional and Amazon will probably fix it. However, we
     do not expect Amazon to change the design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
@@ -454,18 +454,19 @@
   <span class="inserted"><ins><em>&lt;li id="M201606290"&gt;</em></ins></span>
     &lt;p&gt;Antivirus programs have so many errors that &lt;a
     
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
-    may make security worse&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
-  &lt;/li&gt;
+    may make security <span 
class="removed"><del><strong>worse&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;Over 70 brands of network-connected surveillance
 cameras &lt;a 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;have
-security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>worse&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
+    &lt;p&gt;GNU/Linux does not need antivirus 
software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Samsung's</strong></del></span>
 
@@ -587,9 +588,9 @@
   <span class="inserted"><ins><em>&lt;li id="M201510200"&gt;
     &lt;p&gt;&ldquo;Self-encrypting&rdquo;</em></ins></span> disk drives
     do the encryption with proprietary firmware so you
-    can't trust it.  Western Digital's &ldquo;My <span 
class="removed"><del><strong>Passport&rdquo;
-drives
-&lt;a 
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have
 a back door&lt;/a&gt;.
+    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+    have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -599,9 +600,7 @@
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Passport&rdquo; drives &lt;a
-    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-    have a back door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
@@ -630,13 +629,13 @@
 &lt;p&gt;
 I</strong></del></span> <span class="inserted"><ins><em>more.&lt;/p&gt;
 
-    &lt;p&gt;I</em></ins></span> expect that Chrysler and the NSA can do this 
<span class="removed"><del><strong>too.
+    &lt;p&gt;We</em></ins></span> expect that Chrysler and the <span 
class="removed"><del><strong>NSA can do this too.
 &lt;/p&gt;
 &lt;p&gt;
-If</strong></del></span> <span class="inserted"><ins><em>too.&lt;/p&gt;
+If I ever</strong></del></span> <span class="inserted"><ins><em>NSA can do 
this too.&lt;/p&gt;
 
-    &lt;p&gt;If</em></ins></span> I ever own a car, and it contains a portable 
phone, I will
-    deactivate <span class="removed"><del><strong>that.
+    &lt;p&gt;If you</em></ins></span> own a <span 
class="removed"><del><strong>car, and it</strong></del></span> <span 
class="inserted"><ins><em>car that</em></ins></span> contains a <span 
class="removed"><del><strong>portable phone, I will
+deactivate that.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -647,12 +646,13 @@
 &ldquo;&lt;a
 
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
 secure IP device I've ever seen&lt;/a&gt;&rdquo;
-by a security researcher.
+by</strong></del></span> <span class="inserted"><ins><em>phone modem, it would 
be</em></ins></span> a <span class="removed"><del><strong>security researcher.
 &lt;/p&gt;
 &lt;p&gt;
 Depending on what drug is being infused, the insecurity could
-open the door to murder.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that.&lt;/p&gt;</em></ins></span>
+open the door</strong></del></span> <span class="inserted"><ins><em>good
+    idea</em></ins></span> to <span class="removed"><del><strong>murder.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>deactivate 
this.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
@@ -958,7 +958,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/13 12:31:18 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary-insecurity.ja.po        13 Sep 2019 12:31:18 -0000      1.124
+++ proprietary-insecurity.ja.po        18 Sep 2019 16:01:42 -0000      1.125
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -190,10 +190,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -740,13 +740,19 @@
 "めたり、などなどできたのです。"
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "クライスラーとNSAもできるとわたしは考えます。"
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 
"もし、車を持つなら、そしてそれに携帯電話がついているならば、わたしはそれを止"
 "めるでしょう。"

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary-insecurity.pot  13 Sep 2019 12:31:18 -0000      1.91
+++ proprietary-insecurity.pot  18 Sep 2019 16:01:42 -0000      1.92
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -162,10 +162,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a "
-"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
-"to watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -627,13 +627,13 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary-insecurity.ru.po        13 Sep 2019 17:28:51 -0000      1.229
+++ proprietary-insecurity.ru.po        18 Sep 2019 16:01:42 -0000      1.230
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-12-02 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -234,11 +235,22 @@
 "видеоизображение</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Уязвимость третьей стороны, 
предположительно, была непреднамеренной, и 
я "
 "полагаю, в Amazon это исправят. Но я не думаю, 
что Amazon изменит устройство "
@@ -932,13 +944,23 @@
 "отпускать тормоза и т.д."
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "Я думаю, что Крайслер и АНБ тоже это 
могут."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "Если у меня когда-нибудь будет машина и в 
ней будет мобильный телефон, я его "
 "выключу."

Index: proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-sabotage.de-diff.html   16 Sep 2019 08:31:28 -0000      1.44
+++ proprietary-sabotage.de-diff.html   18 Sep 2019 16:01:42 -0000      1.45
@@ -169,7 +169,7 @@
     the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on a further nasty fillip, that sales of the
-    broken devices continued. But I think that is a secondary issue;
+    broken devices continued. But we think that is a secondary issue;
     it made the nasty consequences extend to some additional people.
     The fundamental wrong was to design the devices to depend 
on</em></ins></span> something
 <span class="removed"><del><strong>worse than</strong></del></span>
@@ -821,7 +821,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/16 08:31:28 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary-sabotage.de.po  16 Sep 2019 08:31:28 -0000      1.126
+++ proprietary-sabotage.de.po  18 Sep 2019 16:01:42 -0000      1.127
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:40+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -241,9 +241,21 @@
 "nutzbar</a>.</ins>"
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-sabotage.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-sabotage.es.po  16 Sep 2019 09:48:10 -0000      1.15
+++ proprietary-sabotage.es.po  18 Sep 2019 16:01:42 -0000      1.16
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-16 11:45+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -311,9 +312,21 @@
 "which\">Todas las pulseras dejaron de funcionar para siempre</a>."
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary-sabotage.fr.po  16 Sep 2019 11:42:11 -0000      1.163
+++ proprietary-sabotage.fr.po  18 Sep 2019 16:01:42 -0000      1.164
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-16 13:39+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -310,9 +311,21 @@
 "traqueurs existants ont cessé de fonctionner pour toujours</a>."
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-sabotage.it-diff.html   16 Sep 2019 08:31:30 -0000      1.55
+++ proprietary-sabotage.it-diff.html   18 Sep 2019 16:01:42 -0000      1.56
@@ -175,7 +175,7 @@
     the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on a further nasty fillip, that sales of the
-    broken devices continued. But I think that is a secondary issue;
+    broken devices continued. But we think that is a secondary issue;
     it made the nasty consequences extend to some additional people.
     The fundamental wrong was to design the devices to depend on something
     else that didn't respect users' freedom.&lt;/p&gt;
@@ -796,7 +796,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/16 08:31:30 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary-sabotage.it.po  16 Sep 2019 08:31:30 -0000      1.120
+++ proprietary-sabotage.it.po  18 Sep 2019 16:01:42 -0000      1.121
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-07-06 22:45+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -229,7 +229,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-sabotage.ja-diff.html   16 Sep 2019 08:31:30 -0000      1.59
+++ proprietary-sabotage.ja-diff.html   18 Sep 2019 16:01:42 -0000      1.60
@@ -168,7 +168,7 @@
     the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on a further nasty fillip, that sales of the
-    broken devices continued. But I think that is a secondary issue;
+    broken devices continued. But we think that is a secondary issue;
     it made the nasty consequences extend to some additional people.
     The fundamental wrong was to design the devices to depend on something
     else that didn't respect users' freedom.&lt;/p&gt;
@@ -777,7 +777,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/16 08:31:30 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary-sabotage.ja.po  16 Sep 2019 08:31:30 -0000      1.113
+++ proprietary-sabotage.ja.po  18 Sep 2019 16:01:42 -0000      1.114
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-01-04 10:15+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -221,7 +221,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary-sabotage.pot    16 Sep 2019 08:31:30 -0000      1.78
+++ proprietary-sabotage.pot    18 Sep 2019 16:01:42 -0000      1.79
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -205,7 +205,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary-sabotage.ru.po  16 Sep 2019 09:00:24 -0000      1.197
+++ proprietary-sabotage.ru.po  18 Sep 2019 16:01:42 -0000      1.198
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-12-10 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -310,9 +311,21 @@
 "\">Все существующие устройства навсегда 
прекратили работу.</a>"
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary-surveillance.de-diff.html       18 Sep 2019 10:02:31 -0000      
1.96
+++ proprietary-surveillance.de-diff.html       18 Sep 2019 16:01:42 -0000      
1.97
@@ -862,7 +862,7 @@
     Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
+    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1156,7 +1156,7 @@
     being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
@@ -1204,8 +1204,8 @@
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
@@ -1907,7 +1907,7 @@
       &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
       referring to zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
@@ -3573,7 +3573,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary-surveillance.de.po      18 Sep 2019 10:02:31 -0000      1.311
+++ proprietary-surveillance.de.po      18 Sep 2019 16:01:42 -0000      1.312
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1700,14 +1700,30 @@
 "Hintertür</a> ermöglicht Zugriff auf alle Dateien im System."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#| "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
 "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Spionageprogramme in Android-Telefonen (und Windows-Laptops?): Die "
 "amerikanische Tageszeitung <span xml:lang=\"en\" lang=\"en\">The Wall Street "
@@ -2186,7 +2202,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -2254,9 +2270,15 @@
 msgstr "Das macht sie zu Spionen bei der Durchsetzung von Lizenzen."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Ich [RMS] erwarte, dass es auch DRM umsetzt&#160;&#8209;&#160;dass es keine "
 "Möglichkeit gibt, eine Aufzeichnung zu speichern. Dem Artikel nach kann man "
@@ -3260,7 +3282,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.475
retrieving revision 1.476
diff -u -b -r1.475 -r1.476
--- proprietary-surveillance.fr.po      18 Sep 2019 10:48:29 -0000      1.475
+++ proprietary-surveillance.fr.po      18 Sep 2019 16:01:42 -0000      1.476
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-18 12:48+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1271,14 +1272,30 @@
 "dérobée de Samsung</a> permet l'accès à n'importe quel fichier du 
système."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#| "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
 "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Des logiciels espions dans les téléphones Android et les ordinateurs "
 "portables (sous Windows ?) : le <cite>Wall Street Journal</cite> (dans un "
@@ -1851,8 +1868,16 @@
 "données."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -1945,9 +1970,15 @@
 "Ainsi elle fait office d'espionne au service de l'application des licences."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Je suppose qu'elle implémente aussi la gestion numérique des restrictions 
– "
 "qu'il n'y a aucun moyen de sauvegarder un enregistrement. Mais je ne peux "
@@ -2768,8 +2799,15 @@
 "d'écouter les enregistrements</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Du point de vue éthique, je ne vois aucune différence entre l'écoute par 
des "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary-surveillance.it-diff.html       18 Sep 2019 10:02:31 -0000      
1.163
+++ proprietary-surveillance.it-diff.html       18 Sep 2019 16:01:42 -0000      
1.164
@@ -967,7 +967,8 @@
     Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
+    and <span class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably</em></ins></span> 
Windows <span class="removed"><del><strong>laptops.)</strong></del></span> 
<span class="inserted"><ins><em>laptops).</em></ins></span>  Here is &lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1026,39 +1027,40 @@
 
 <span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+               &lt;p&gt;Faceapp appears to do</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data in the 
device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
+  &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of <span class="removed"><del><strong>its 
phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+    the e-reader used by most US libraries, &lt;a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send</em></ins></span> lots of <span 
class="removed"><del><strong>surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal</strong></del></span> 
data <span class="inserted"><ins><em>to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets 
when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</em></ins></span>
 they <span class="removed"><del><strong>use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the user <span 
class="removed"><del><strong>must explicitly opt-in before the app takes 
effect. However, the
+    <span class="inserted"><ins><em>report even which page</em></ins></span> 
the user <span class="removed"><del><strong>must explicitly opt-in before the 
app takes effect. However, the
     app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -1498,7 +1500,7 @@
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP</strong></del></span> <span 
class="inserted"><ins><em>will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
@@ -1546,8 +1548,8 @@
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
@@ -1960,7 +1962,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3337,7 +3339,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.324
retrieving revision 1.325
diff -u -b -r1.324 -r1.325
--- proprietary-surveillance.it.po      18 Sep 2019 10:02:31 -0000      1.324
+++ proprietary-surveillance.it.po      18 Sep 2019 16:01:43 -0000      1.325
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1633,7 +1633,13 @@
 "Samsung</a> fornisce accesso a qualsiasi file sul sistema."
 
 #. type: Content of: <ul><li><p>
-# || No change detected.  The change might only be in amounts of spaces.
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
 #, fuzzy
 #| msgid ""
 #| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
@@ -1648,9 +1654,9 @@
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Spyware nei telefoni Android (e computer portatili, forse Windows): il Wall "
 "Street Journal (in un articolo che può essere letto solo previo pagamento) "
@@ -2129,7 +2135,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -2195,8 +2201,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -3091,7 +3097,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary-surveillance.ja-diff.html       18 Sep 2019 10:02:31 -0000      
1.179
+++ proprietary-surveillance.ja-diff.html       18 Sep 2019 16:01:43 -0000      
1.180
@@ -900,7 +900,8 @@
     Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
+    and <span class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably</em></ins></span> 
Windows <span class="removed"><del><strong>laptops.)</strong></del></span> 
<span class="inserted"><ins><em>laptops).</em></ins></span>  Here is &lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1232,10 +1233,13 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
     &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+      minute (thus, indirectly, whether it is surrounded by a person's
+      body), and the vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note the totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
     
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can 
use</em></ins></span> it <span class="removed"><del><strong>is surrounded 
by</strong></del></span>
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
@@ -1244,271 +1248,113 @@
   &lt;/li&gt;
 
   &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="removed"><del><strong>person's
-      body),</strong></del></span> <span class="inserted"><ins><em>convenient 
proprietary
+    &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
     sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
 
-      &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>personal
-    data they collected</em></ins></span> would <span 
class="removed"><del><strong>make statements about
-      their products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>go to Facebook as 
well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one</em></ins></span> can <span 
class="removed"><del><strong>check
-      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>spy on children</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>apparent violation 
of
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This 
proves</em></ins></span>
-    that the <span class="removed"><del><strong>specific sabotage method 
Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>development 
platform are ineffective at
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>Google 
Play had one or more malicious functionalities, such as</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span class="inserted"><ins><em>them 
was designed to make uninstallation
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps 
if</em></ins></span> they <span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>haven't yet, but they should also stay 
away from nonfree apps</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
-    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+  &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising&mdash;that could
-    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
     href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>will do
-    with</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about a side issue. 
What</em></ins></span> the <span class="removed"><del><strong>user reads at 
what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>company 
does
-    with</em></ins></span> the <span class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of</strong></del></span> data <span 
class="removed"><del><strong>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed to check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>is a secondary 
issue. The principal wrong here is that
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and 
WeatherBug,</em></ins></span> are
-  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>tracking people's 
locations.&lt;/p&gt;</em></ins></span> 
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span>
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span class="removed"><del><strong>system 
has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>Nissan has no
-    access.  The software in</strong></del></span>
-    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the <span class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith</strong></del></span> <span 
class="inserted"><ins><em>obtains</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to</strong></del></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>same 
machine via
-    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>phone company to 
track</strong></del></span> <span class="inserted"><ins><em>user's activities 
in</em></ins></span> the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>app; others only say 
that</em></ins></span> the <span class="removed"><del><strong>time; 
it</strong></del></span> <span class="inserted"><ins><em>user</em></ins></span> 
is <span class="removed"><del><strong>possible to physically 
remove</strong></del></span>
-    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
-
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These 
systems</strong></del></span> <span class="inserted"><ins><em>users that have 
deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
@@ -1517,91 +1363,40 @@
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There</em></ins></span> are <span class="removed"><del><strong>an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. 
The</strong></del></span> other
-      <span class="removed"><del><strong>cases mentioned are 
done</strong></del></span> <span class="inserted"><ins><em>kinds of location
-    tracking, but most users will be tricked</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>user's 
movements</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company 
says</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to snoop</em></ins></span>
-    and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40% of</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> were <span 
class="removed"><del><strong>programmed</strong></del></span>
-    <span class="inserted"><ins><em>found</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke:</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
-    source code they cannot look at.</em></ins></span>  The other <span 
class="removed"><del><strong>day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping
-    in</em></ins></span> other <span class="removed"><del><strong>way.&rdquo; 
Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ways.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>is evidence</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>proprietary apps generally work against
+    &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
-    need</em></ins></span> to get <span class="removed"><del><strong>users' 
formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>rid 
of</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
-    Android by &lt;a 
href="https://replicant.us"&gt;switching</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
-    and</em></ins></span> the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps from the free 
software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
     the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1609,141 +1404,77 @@
   &lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users</em></ins></span> are <span 
class="inserted"><ins><em>HIV-positive, then provides the information to
+    which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
     It could be designed so that users communicate such info to each
-    other but</em></ins></span> not <span 
class="removed"><del><strong>allowed</strong></del></span> to <span 
class="removed"><del><strong>report what</strong></del></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;</em></ins></span>
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
+  &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy</em></ins></span> on 
-      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>users even more 
than users expected. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    spy on users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>detail</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
-    is pervasive</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers</strong></del></span> <span 
class="inserted"><ins><em>sometimes very clever. Some 
trackers</em></ins></span> can <span class="removed"><del><strong>track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible to turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store</em></ins></span> by 
<span class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    follow a user's movements around a physical store by noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, 
exposing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads</em></ins></span> all <span class="removed"><del><strong>users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>phone numbers</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible sounds to be
-      picked up by proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt;</em></ins></span> in
-      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>user's address
-    book</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note</em></ins></span> that 
<span class="removed"><del><strong>they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span> <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>words
+  &lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app &lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;</em></ins></span>
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls</em></ins></span> and <span class="removed"><del><strong>would then 
have</strong></del></span> <span class="inserted"><ins><em>sent them and text 
messages and emails</em></ins></span> to
-      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the 
contrary,</em></ins></span> it
-    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="inserted"><ins><em>prevent that, and deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>US or 
some</strong></del></span> other <span 
class="removed"><del><strong>government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not to be trusted unless it is done
-    by free software</strong></del></span> <span 
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
-    therefore shares</em></ins></span> in <span 
class="removed"><del><strong>your</strong></del></span> <span 
class="inserted"><ins><em>the responsibility for the injustice of their being
-    nonfree. It also distributes its</em></ins></span> own <span 
class="removed"><del><strong>computer.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>nonfree apps, such as Google Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see</em></ins></span> what <span 
class="inserted"><ins><em>they do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>user watches,</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps,</em></ins></span> and 
<span class="inserted"><ins><em>study</em></ins></span>
-    the <span class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>source code somehow</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The fact that the
-      transmission reports a 404 error really means nothing; the server
-      could save that data anyway.)&lt;/p&gt;
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on the user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
-    various ways. If</em></ins></span> it <span 
class="removed"><del><strong>had installed</strong></del></span> <span 
class="inserted"><ins><em>did</em></ins></span> a <span 
class="removed"><del><strong>patch to stop</strong></del></span> <span 
class="inserted"><ins><em>good job of</em></ins></span> this, <span 
class="removed"><del><strong>but any product</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> could <span 
class="removed"><del><strong>spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> <span class="inserted"><ins><em>more or less
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>spying anyway&lt;/a&gt;.&lt;/p&gt;
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span> <span class="inserted"><ins><em>source 
code</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the
-    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareAtPlay --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span>
+  &lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;</em></ins></span>
-    snoop on <span class="removed"><del><strong>their</strong></del></span> 
<span class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;With free software apps,</em></ins></span> users <span 
class="removed"><del><strong>and report</strong></del></span> <span 
class="inserted"><ins><em>could &lt;em&gt;make sure&lt;/em&gt; that they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
@@ -1759,31 +1490,17 @@
   &lt;li id="M201704260"&gt;
     &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands</em></ins></span> to <span 
class="inserted"><ins><em>personal data in</em></ins></span> the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing</em></ins></span> a <span class="removed"><del><strong>wide 
range</strong></del></span> <span class="inserted"><ins><em>spyware app for its 
headphones&lt;/a&gt;.  Specifically,
-    the app would record the names</em></ins></span> of <span 
class="removed"><del><strong>data about their</strong></del></span> <span 
class="inserted"><ins><em>the audio files</em></ins></span> users <span 
class="removed"><del><strong>and their users' 
-      friends and associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do it through ad 
networks</strong></del></span> <span class="inserted"><ins><em>listen to
+  &lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for &lt;a
+    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>this was done without</em></ins></span> the <span 
class="removed"><del><strong>data
-      collected by various cr&hellip;apps and sites made by different 
-      companies.&lt;/p&gt;
-
-      &lt;p&gt;They use this</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
@@ -1792,7 +1509,7 @@
 
   &lt;li id="M201704074"&gt;
     &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal</em></ins></span> data to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>servers. &lt;a
+    to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1816,16 +1533,16 @@
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>buy 
things,</strong></del></span> <span class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before</em></ins></span> and <span 
class="removed"><del><strong>hunt</strong></del></span> <span 
class="inserted"><ins><em>after the ride&lt;/a&gt;.&lt;/p&gt;
+    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo;</em></ins></span> for <span 
class="removed"><del><strong>&ldquo;whales&rdquo; who can</strong></del></span> 
<span class="inserted"><ins><em>surveillance is inadequate as a protection 
against
+    consent&rdquo; for surveillance is inadequate as a protection against
     massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1835,11 +1552,11 @@
     research paper&lt;/a&gt; that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may</em></ins></span> be <span 
class="removed"><del><strong>led</strong></del></span> <span 
class="inserted"><ins><em>unawarely subject</em></ins></span> to <span 
class="removed"><del><strong>spend</strong></del></span> <span 
class="inserted"><ins><em>poor security
+    apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>lot</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research 
paper,</em></ins></span>
-    of <span class="removed"><del><strong>money. They</strong></del></span> 
<span class="inserted"><ins><em>some proprietary VPN apps that track users and 
infringe their
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
@@ -1854,11 +1571,11 @@
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps and</em></ins></span> also <span 
class="removed"><del><strong>use a back door</strong></del></span> <span 
class="inserted"><ins><em>core system logs. TigerVPN developers have
+      for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>LinkedIn. Also, it stores detailed logs and
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
       may turn them over to the UK government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -2071,7 +1788,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2311,17 +2028,21 @@
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably the TV will
+    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably the TV will
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>make statements about
+      their products, rather than free software which users can check
+      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
     reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
@@ -2330,8 +2051,8 @@
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
-    product could spy this way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="inserted"><ins><em>stop this, but any
+    product could</em></ins></span> spy <span class="inserted"><ins><em>this 
way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
@@ -2341,49 +2062,90 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found a way to break security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
+    and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
+<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
     send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by, the user's front door.&lt;/p&gt;
+    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at the videos freely.  It appears Amazon has tried to prevent that
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look</em></ins></span>
+    at <span class="removed"><del><strong>Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>the videos 
freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give</em></ins></span> the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>everything</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span>
+    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
+    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
+    manufacturers promise not to look at what's</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>the videos. That's not
     security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2393,27 +2155,43 @@
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    to outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
+    into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
     recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2421,7 +2199,18 @@
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>its users 
through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
@@ -2430,33 +2219,78 @@
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
     products, rather than free software which users could have checked
-    and changed.&lt;/p&gt;
+    and changed.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The company that made the vibrator &lt;a
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>company that made</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but it doesn't really matter. If</em></ins></span> it <span 
class="inserted"><ins><em>had sold the data</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out 
who</em></ins></span> the
+    user <span class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span class="inserted"><ins><em>pay a total 
of C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
+    customers.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>nonfree software are</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  effectively
+  anyone</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to</em></ins></span> access <span 
class="removed"><del><strong>its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>do because</strong></del></span> <span 
class="inserted"><ins><em>these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2464,12 +2298,15 @@
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen</em></ins></span> in <span class="inserted"><ins><em>on 
a child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span>
+    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
@@ -2488,8 +2325,10 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    to snoop on other people, DJI</em></ins></span> is
+    <span class="removed"><del><strong>proprietary,</strong></del></span> 
<span class="inserted"><ins><em>in many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2503,116 +2342,196 @@
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    when</em></ins></span> it <span class="removed"><del><strong>demands blind 
faith</strong></del></span> <span class="inserted"><ins><em>is not supposed to 
listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
-    users were easily identified from these recordings.&lt;/p&gt;
+    users were easily identified</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what it records or sends.&lt;/p&gt;
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is</em></ins></span> no <span class="removed"><del><strong>one 
connects</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> to <span 
class="inserted"><ins><em>see or control what it records or sends.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying to better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google service.&lt;/p&gt;
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
+    get commands that</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send to some Google 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more</em></ins></span> information 
<span class="removed"><del><strong>about drivers' movements&lt;/a&gt;,
+      which</strong></del></span> <span class="inserted"><ins><em>from users
+    than</em></ins></span> is <span class="inserted"><ins><em>necessary for 
correct functioning (time, location,
+    recordings</em></ins></span> made <span 
class="removed"><del><strong>available to car manufacturers, insurance 
companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span 
class="inserted"><ins><em>without</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
     even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
-    advertising companies and government agencies. In other words,
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>invasion isn't 
done</strong></del></span> <span class="inserted"><ins><em>data remain on other 
servers&lt;/a&gt;, where they can be accessed</em></ins></span> by <span 
class="removed"><del><strong>malware. The</strong></del></span>
+    <span class="inserted"><ins><em>advertising companies and government 
agencies. In</em></ins></span> other
+      <span class="removed"><del><strong>cases mentioned</strong></del></span> 
<span class="inserted"><ins><em>words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
+    the devices</em></ins></span> are <span class="removed"><del><strong>done 
by proprietary malware</strong></del></span> <span 
class="inserted"><ins><em>tethered to. Moreover, they are made available to
     Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
+    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
     in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;).</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;.</em></ins></span> 
The <span class="removed"><del><strong>company says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span> 
to <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="inserted"><ins><em>client program is nonfree, and</em></ins></span> data 
<span class="inserted"><ins><em>processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
+    tell you how</em></ins></span> and <span class="removed"><del><strong>hand 
it over,</strong></del></span> <span class="inserted"><ins><em>where it's 
done&rdquo;), users have no way
+    to know what happens to</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>recordings 
unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span>
 
-  &lt;li id="M201902080"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
-    paid for.&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt; to</em></ins></span> make sure 
<span class="removed"><del><strong>to place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>the user is still
+    paying for the subscription, and hasn't printed more pages 
than</em></ins></span> were <span class="removed"><del><strong>programmed to 
spy</strong></del></span>
+    <span class="inserted"><ins><em>paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use of ink cartridges that would otherwise be in
+    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
+    restrictions</em></ins></span> in <span class="removed"><del><strong>TV 
Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>security of 
an</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>device,
+    and</em></ins></span> &lt;a <span class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in that country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
+    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  &lt;li id="M201804140"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
+    offers</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV manufacturers in spying</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that 
snoops</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>its user by
     sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>products are 
designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone</em></ins></span> in <span 
class="removed"><del><strong>detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;
+    a device</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> can <span 
class="removed"><del><strong>track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
+    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all users to
+      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
+      range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2628,8 +2547,10 @@
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of what they do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="inserted"><ins><em>companies
+    monitor every aspect of what</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2638,16 +2559,18 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  &lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
     to report its location to someone else and to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
@@ -2662,31 +2585,36 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
-    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
&lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>junkyard the driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
     near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
-    including car location. This feature operates even when the ignition
+    connected to the cellular phone network</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> <span 
class="inserted"><ins><em>sends Ford a lot of data,
+    including car location. This feature operates even when</em></ins></span> 
the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
-    antenna in aluminum foil?&lt;/p&gt;
+    antenna in aluminum foil?&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201811300"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201811300"&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with a terminal that &lt;a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
-    transfers technical data, including car location,
-    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    cars to be equipped with a terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,</em></ins></span>
+    to <span class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>a government-run platform&lt;/a&gt;. In practice, 
&lt;a
     href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to the government-run platform.&lt;/p&gt;
@@ -2698,28 +2626,33 @@
     tracked the choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
-    sneaking it into the contract that users sign for some digital service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="inserted"><ins><em>you,
     watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection 
should</em></ins></span> be <span class="removed"><del><strong>trusted unless 
it</strong></del></span> <span class="inserted"><ins><em>forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the 
software</em></ins></span>
+    is <span class="removed"><del><strong>done
+    by</strong></del></span> free <span class="removed"><del><strong>software 
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't 
collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+    track</em></ins></span> your <span class="removed"><del><strong>own 
computer.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>every 
move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  &lt;li id="M201607160"&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
-    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2727,39 +2660,85 @@
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely and make changes in various
+    access its computers remotely</em></ins></span> and
+      <span class="removed"><del><strong>the switch</strong></del></span> 
<span class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication
-    when accessed through the modem.  However, even if it asked
+    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>turn this off</strong></del></span> <span 
class="inserted"><ins><em>do because the system</em></ins></span> has no <span 
class="removed"><del><strong>effect.  (The fact that the
+      transmission reports a 404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>authentication
+    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>server
+      could save that data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if</em></ins></span> it
+      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>asked
     for authentication, you couldn't be confident that Nissan
-    has no access.  The software in the car is proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
+    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtPlay --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and report</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+    &lt;p&gt;Even if no one connects</em></ins></span> to the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
     enables the phone company to track the car's movements all the time;
-    it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
+    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company to extract
-    data remotely and determine the car's location
-    at any time. (See Section 2, paragraphs b and c of the &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
+    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says it doesn't store this
-    information, but if the state orders it to get the data and hand it
+    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+    information, but if the state orders it to get</em></ins></span> the data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
     over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201303250"&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
     
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which is made
-    available to car manufacturers, insurance companies, and others.&lt;/p&gt;
+    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
+      companies.&lt;/p&gt;
 
-    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
-    is not really a matter of proprietary surveillance. These systems
+      &lt;p&gt;They use this data to manipulate people</strong></del></span>
+    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
+
+    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
+      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door to manipulate</strong></del></span> <span class="inserted"><ins><em>matter 
of proprietary surveillance. These systems
     are an intolerable invasion of privacy, and should be replaced with
     anonymous payment systems, but the invasion isn't done by malware. The
     other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
@@ -3190,7 +3169,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary-surveillance.ja.po      18 Sep 2019 10:02:31 -0000      1.305
+++ proprietary-surveillance.ja.po      18 Sep 2019 16:01:43 -0000      1.306
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1225,14 +1225,23 @@
 "クドア</a>はシステム
上のどんなファイルにもアクセスを提供します。"
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#| "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
 "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "(ペイ・ウォールでブロックされる記事です)は<a 
href=\"http://www.theverge.";
 "com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-"
@@ -1650,7 +1659,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -1716,8 +1725,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2360,7 +2369,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary-surveillance.pot        18 Sep 2019 10:02:31 -0000      1.245
+++ proprietary-surveillance.pot        18 Sep 2019 16:01:43 -0000      1.246
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -900,7 +900,7 @@
 "(in an article blocked from us by a paywall) reports that <a "
 
"href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
 "
 "the FBI can remotely activate the GPS and microphone in Android phones and "
-"laptops</a>.  (I suspect this means Windows laptops.)  Here is <a "
+"laptops</a> (presumably Windows laptops).  Here is <a "
 "href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>."
 msgstr ""
 
@@ -1270,7 +1270,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -1337,8 +1337,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1882,7 +1882,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.569
retrieving revision 1.570
diff -u -b -r1.569 -r1.570
--- proprietary-surveillance.ru.po      18 Sep 2019 14:29:41 -0000      1.569
+++ proprietary-surveillance.ru.po      18 Sep 2019 16:01:43 -0000      1.570
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1257,14 +1258,30 @@
 "Samsung</a> предоставляет доступ к любому 
файлу в системе."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#| "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
 "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Шпионские программы в телефонах Android (и 
портативных компьютерах [с "
 "Windows?]): &ldquo;Уолл-стрит джорнел&rdquo; (в 
статье, закрытой от нас "
@@ -1828,8 +1845,16 @@
 "делать с этими данными."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -1924,9 +1949,15 @@
 msgstr "Таким образом, они шпионят в 
лицензионных целях."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Я не удивлюсь, если в нем реализовано и 
цифровое управление "
 "ограничениями&nbsp;&mdash; т.е. сохранить 
запись невозможно. Но из статьи "
@@ -2743,8 +2774,15 @@
 "прослушивать записи</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Я не вижу моральной разницы между 
прослушиванием работниками-людьми и "

Index: proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-tethers.de-diff.html    13 Sep 2019 12:31:20 -0000      1.20
+++ proprietary-tethers.de-diff.html    18 Sep 2019 16:01:43 -0000      1.21
@@ -112,7 +112,7 @@
     the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on a further nasty fillip, that sales of the
-    broken devices continued. But I think that is a secondary issue;
+    broken devices continued. But <span 
class="removed"><del><strong>I</strong></del></span> <span 
class="inserted"><ins><em>we</em></ins></span> think that is a secondary issue;
     it made the nasty consequences extend to some additional people.
     The fundamental wrong was to design the devices to depend on something
     else that didn't respect users' freedom.&lt;/p&gt;
@@ -306,7 +306,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/13 12:31:20 $
+$Date: 2019/09/18 16:01:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-tethers.de.po   13 Sep 2019 12:31:21 -0000      1.32
+++ proprietary-tethers.de.po   18 Sep 2019 16:01:43 -0000      1.33
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -158,9 +158,21 @@
 "nutzbar</a>.</ins>"
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary-tethers.fr.po   15 Sep 2019 12:48:10 -0000      1.60
+++ proprietary-tethers.fr.po   18 Sep 2019 16:01:43 -0000      1.61
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-13 14:48+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -172,9 +173,21 @@
 "traqueurs existants ont cessé de fonctionner pour toujours</a>."
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary-tethers.ja-diff.html    13 Sep 2019 12:31:23 -0000      1.39
+++ proprietary-tethers.ja-diff.html    18 Sep 2019 16:01:43 -0000      1.40
@@ -105,7 +105,7 @@
     the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on a further nasty fillip, that sales of the
-    broken devices continued. But I think that</em></ins></span> is <span 
class="inserted"><ins><em>a secondary issue;
+    broken devices continued. But we think that is a secondary issue;
     it made the nasty consequences extend to some additional people.
     The fundamental wrong was to design the devices to depend on something
     else that didn't respect users' freedom.&lt;/p&gt;
@@ -113,10 +113,7 @@
 
   &lt;li id="M201806250"&gt;
     &lt;p&gt;The game Metal Gear Rising for
-    MacOS was</em></ins></span> tethered to a <span 
class="removed"><del><strong>server.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>server.  The 
company &lt;a
+    MacOS was tethered to a server.  The company &lt;a
     
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;
     shut down the server, and all copies stopped working&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -128,7 +125,7 @@
     turning off the server through which the products' supposed owners
     communicate with them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The owners suspect this is to pressure them to buy a newer model. 
If
+    &lt;p&gt;The owners suspect this</em></ins></span> is <span 
class="inserted"><ins><em>to pressure them to buy a newer model. If
     they are wise, they will learn, rather, to distrust any product that
     requires users to talk with them through some specialized 
service.&lt;/p&gt;
   &lt;/li&gt;
@@ -136,7 +133,10 @@
   &lt;li id="M201711010"&gt;
     &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with a universal back door, and tethered to a server that requires
+    with a universal back door, and</em></ins></span> tethered to a <span 
class="removed"><del><strong>server.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>server that 
requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -290,7 +290,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/13 12:31:23 $
+$Date: 2019/09/18 16:01:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary-tethers.ja.po   13 Sep 2019 12:31:23 -0000      1.31
+++ proprietary-tethers.ja.po   18 Sep 2019 16:01:43 -0000      1.32
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -137,7 +137,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-tethers.pot     13 Sep 2019 12:31:23 -0000      1.29
+++ proprietary-tethers.pot     18 Sep 2019 16:01:43 -0000      1.30
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -125,7 +125,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-tethers.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-tethers.pt-br.po        15 Sep 2019 08:59:36 -0000      1.7
+++ proprietary-tethers.pt-br.po        18 Sep 2019 16:01:43 -0000      1.8
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-15 05:27-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -171,9 +172,16 @@
 "para sempre</a>."
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary-tethers.ru.po   13 Sep 2019 17:28:51 -0000      1.65
+++ proprietary-tethers.ru.po   18 Sep 2019 16:01:43 -0000      1.66
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-10-01 09:13+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -177,9 +178,21 @@
 "\">Все существующие устройства навсегда 
прекратили работу.</a>"
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.de-diff.html    18 Sep 2019 10:02:31 -0000      1.125
+++ proprietary.de-diff.html    18 Sep 2019 16:01:43 -0000      1.126
@@ -45,10 +45,10 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -101,18 +101,18 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -131,9 +131,9 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -221,7 +221,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -297,7 +297,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.de.po   18 Sep 2019 10:02:31 -0000      1.167
+++ proprietary.de.po   18 Sep 2019 16:01:43 -0000      1.168
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -499,7 +499,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary.es.po   18 Sep 2019 10:02:31 -0000      1.219
+++ proprietary.es.po   18 Sep 2019 16:01:43 -0000      1.220
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -376,8 +376,15 @@
 "grabaciones</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Desde el punto de vista moral no veo ninguna diferencia entre tener "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- proprietary.fr.po   18 Sep 2019 10:48:29 -0000      1.265
+++ proprietary.fr.po   18 Sep 2019 16:01:43 -0000      1.266
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-18 12:48+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -375,8 +376,15 @@
 "d'écouter les enregistrements</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Du point de vue éthique, je ne vois aucune différence entre l'écoute par 
des "

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary.it-diff.html    18 Sep 2019 10:02:32 -0000      1.137
+++ proprietary.it-diff.html    18 Sep 2019 16:01:43 -0000      1.138
@@ -220,7 +220,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -296,7 +296,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:32 $
+$Date: 2019/09/18 16:01:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary.it.po   18 Sep 2019 10:02:32 -0000      1.176
+++ proprietary.it.po   18 Sep 2019 16:01:43 -0000      1.177
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -503,7 +503,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary.ja-diff.html    18 Sep 2019 10:02:32 -0000      1.140
+++ proprietary.ja-diff.html    18 Sep 2019 16:01:43 -0000      1.141
@@ -218,7 +218,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -294,7 +294,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:32 $
+$Date: 2019/09/18 16:01:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary.ja.po   18 Sep 2019 10:02:32 -0000      1.160
+++ proprietary.ja.po   18 Sep 2019 16:01:43 -0000      1.161
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -363,7 +363,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary.nl-diff.html    18 Sep 2019 10:02:32 -0000      1.138
+++ proprietary.nl-diff.html    18 Sep 2019 16:01:43 -0000      1.139
@@ -101,19 +101,19 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -220,7 +220,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -296,7 +296,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:32 $
+$Date: 2019/09/18 16:01:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary.nl.po   18 Sep 2019 10:02:32 -0000      1.150
+++ proprietary.nl.po   18 Sep 2019 16:01:43 -0000      1.151
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -405,7 +405,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary.pl-diff.html    18 Sep 2019 10:02:32 -0000      1.155
+++ proprietary.pl-diff.html    18 Sep 2019 16:01:43 -0000      1.156
@@ -218,7 +218,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -294,7 +294,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:32 $
+$Date: 2019/09/18 16:01:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary.pl.po   18 Sep 2019 10:02:32 -0000      1.143
+++ proprietary.pl.po   18 Sep 2019 16:01:43 -0000      1.144
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -584,7 +584,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary.pot     18 Sep 2019 10:02:32 -0000      1.140
+++ proprietary.pot     18 Sep 2019 16:01:43 -0000      1.141
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -300,7 +300,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary.pt-br.po        18 Sep 2019 10:02:32 -0000      1.225
+++ proprietary.pt-br.po        18 Sep 2019 16:01:43 -0000      1.226
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-09-16 19:48-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -368,8 +368,12 @@
 "homes-kinect-cortana\"> trabalhadores humanos ouvindo às gravações</a>."
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Moralmente, não vejo diferença entre ter trabalhadores humanos ouvindo ou "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.298
retrieving revision 1.299
diff -u -b -r1.298 -r1.299
--- proprietary.ru.po   18 Sep 2019 14:29:41 -0000      1.298
+++ proprietary.ru.po   18 Sep 2019 16:01:43 -0000      1.299
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -378,8 +379,15 @@
 "прослушивать записи</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Я не вижу моральной разницы между 
прослушиванием работниками-людьми и "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary.zh-tw-diff.html 18 Sep 2019 10:02:32 -0000      1.117
+++ proprietary.zh-tw-diff.html 18 Sep 2019 16:01:43 -0000      1.118
@@ -45,10 +45,10 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -101,18 +101,18 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -131,9 +131,9 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -221,7 +221,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally I see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -297,7 +297,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/09/18 10:02:32 $
+$Date: 2019/09/18 16:01:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary.zh-tw.po        18 Sep 2019 10:02:32 -0000      1.128
+++ proprietary.zh-tw.po        18 Sep 2019 16:01:43 -0000      1.129
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -477,7 +477,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- pt-br.po    18 Sep 2019 10:02:32 -0000      1.183
+++ pt-br.po    18 Sep 2019 16:01:43 -0000      1.184
@@ -460,11 +460,17 @@
 "pessoa também pode assistir, e falsificar vídeos também</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "A vulnerabilidade de terceiros é presumivelmente não intencional e suponho "
 "que a Amazon consertará isso. Não tenho esperanças de que a Amazon mude o "
@@ -1773,9 +1779,16 @@
 "para sempre</a>."
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -2948,13 +2961,13 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -3194,8 +3207,12 @@
 "homes-kinect-cortana\"> trabalhadores humanos ouvindo às gravações</a>."
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Moralmente, não vejo diferença entre ter trabalhadores humanos ouvindo ou "
@@ -4056,9 +4073,9 @@
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -5543,8 +5560,13 @@
 "com os dados."
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -5629,8 +5651,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -8695,6 +8717,27 @@
 "Processadores da Intel terão software tirano embutido</a>."
 
 #~ msgid ""
+#~ "The article focuses on a further nasty fillip, that sales of the broken "
+#~ "devices continued. But I think that is a secondary issue; it made the "
+#~ "nasty consequences extend to some additional people.  The fundamental "
+#~ "wrong was to design the devices to depend on something else that didn't "
+#~ "respect users' freedom."
+#~ msgstr ""
+#~ "O artigo concentra-se em mais um impulso desagradável, de que as vendas "
+#~ "dos dispositivos quebrados continuaram. Mas acho que isso é secundário. "
+#~ "Isso fez com que as consequências desagradáveis se estendessem a algumas 
"
+#~ "pessoas adicionais. O erro fundamental foi projetar os dispositivos para "
+#~ "depender de outra coisa que não respeitou a liberdade dos usuários."
+
+#~ msgid ""
+#~ "Morally I see no difference between having human workers listen and "
+#~ "having speech-recognition systems listen.  Both intrude on privacy."
+#~ msgstr ""
+#~ "Moralmente, não vejo diferença entre ter trabalhadores humanos ouvindo 
ou "
+#~ "sistemas de reconhecimento de fala ouvindo. Ambos se intrometem na "
+#~ "privacidade."
+
+#~ msgid ""
 #~ "This page is licensed under a <a rel=\"license\" href=\"http://";
 #~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
 #~ "NoDerivatives 4.0 International License</a>."

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- ru.po       18 Sep 2019 14:07:17 -0000      1.302
+++ ru.po       18 Sep 2019 16:01:43 -0000      1.303
@@ -553,11 +553,22 @@
 "видеоизображение</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 "Уязвимость третьей стороны, 
предположительно, была непреднамеренной, и 
я "
 "полагаю, в Amazon это исправят. Но я не думаю, 
что Amazon изменит устройство "
@@ -2182,9 +2193,21 @@
 "\">Все существующие устройства навсегда 
прекратили работу.</a>"
 
 #. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people.  The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people.  The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -3776,13 +3799,23 @@
 "отпускать тормоза и т.д."
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr "Я думаю, что Крайслер и АНБ тоже это 
могут."
 
 #. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 "Если у меня когда-нибудь будет машина и в 
ней будет мобильный телефон, я его "
 "выключу."
@@ -4039,8 +4072,15 @@
 "прослушивать записи</a>."
 
 #. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen.  Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen.  Both intrude on privacy."
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 "Я не вижу моральной разницы между 
прослушиванием работниками-людьми и "
@@ -5068,14 +5108,30 @@
 "a> и за другими установленными 
программами."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# | 
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\";>
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>.  (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+}  Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#| "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
 msgid ""
 "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 "Шпионские программы в телефонах Android (и 
портативных компьютерах [с "
 "Windows?]): &ldquo;Уолл-стрит джорнел&rdquo; (в 
статье, закрытой от нас "
@@ -6716,10 +6772,10 @@
 "\"https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-";
 "maya-mia-fem\"> send intimate details of users' lives to Facebook</a>."
 msgstr ""
-"Некоторые несвободные приложения для 
отслеживания периода, в том числе "
-"MIA Fem и Maya <a href="
-"\"https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-";
-"maya-mia-fem\"> отсылают интимные подробности 
жизни пользователей в Facebook</a>."
+"Некоторые несвободные приложения для 
отслеживания периода, в том числе MIA "
+"Fem и Maya <a href=\"https://www.buzzfeednews.com/article/meghara/period-";
+"tracker-apps-facebook-maya-mia-fem\"> отсылают интимные 
подробности жизни "
+"пользователей в Facebook</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -6988,8 +7044,16 @@
 "делать с этими данными."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -7076,9 +7140,15 @@
 msgstr "Таким образом, они шпионят в 
лицензионных целях."
 
 #. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too&mdash;that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too&mdash;that there is no way to save a "
+#| "recording. But I can't be sure from the article."
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 "Я не удивлюсь, если в нем реализовано и 
цифровое управление "
 "ограничениями&nbsp;&mdash; т.е. сохранить 
запись невозможно. Но из статьи "
@@ -10921,6 +10991,85 @@
 "процессорах Intel будут встроенные 
несвободные программы-тираны</a>."
 
 #~ msgid ""
+#~ "The third party vulnerability is presumably unintentional and I suppose "
+#~ "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#~ "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#~ "Amazon to watch</a>."
+#~ msgstr ""
+#~ "Уязвимость третьей стороны, 
предположительно, была непреднамеренной, и 
я "
+#~ "полагаю, в Amazon это исправят. Но я не 
думаю, что Amazon изменит "
+#~ "устройство программы, которое <a 
href=\"/proprietary/proprietary-"
+#~ "surveillance.html#M201901100\">позволяет Amazon смотреть 
через камеру</a>."
+
+#~ msgid ""
+#~ "The article focuses on a further nasty fillip, that sales of the broken "
+#~ "devices continued. But I think that is a secondary issue; it made the "
+#~ "nasty consequences extend to some additional people.  The fundamental "
+#~ "wrong was to design the devices to depend on something else that didn't "
+#~ "respect users' freedom."
+#~ msgstr ""
+#~ "Статья обсуждает продолжение этой 
скверной истории&nbsp;&mdash; то, что "
+#~ "неработающие устройства продолжали 
продавать. Но я думаю, то "
+#~ "второстепенная проблема; из-за этого 
последствия распространились еще на "
+#~ "каких-то людей. Принципиальная 
несправедливость была в том, что эти "
+#~ "устройства были спроектированы так, 
чтобы зависеть от чего-то еще, что не "
+#~ "уважает свободу пользователей."
+
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr "Я думаю, что Крайслер и АНБ тоже это 
могут."
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ "Если у меня когда-нибудь будет машина и в 
ней будет мобильный телефон, я "
+#~ "его выключу."
+
+#~ msgid ""
+#~ "Morally I see no difference between having human workers listen and "
+#~ "having speech-recognition systems listen.  Both intrude on privacy."
+#~ msgstr ""
+#~ "Я не вижу моральной разницы между 
прослушиванием работниками-людьми и "
+#~ "прослушиванием системами распознавания 
речи. И то, и другое представляет "
+#~ "вторжение в личную жизнь."
+
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-";
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>.  (I "
+#~ "suspect this means Windows laptops.)  Here is <a href=\"http://cryptome.";
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "Шпионские программы в телефонах Android (и 
портативных компьютерах [с "
+#~ "Windows?]): &ldquo;Уолл-стрит джорнел&rdquo; (в 
статье, закрытой от нас "
+#~ "барьером платежа) сообщает, что <a 
href=\"http://www.theverge.";
+#~ "com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-"
+#~ "microphones-reports-wsj\">ФБР может удаленной 
командой включать приемник "
+#~ "GPS и микрофон в телефонах с Android и 
портативных компьютерах</a>.  (Я "
+#~ "подозреваю, что речь идет о компьютерах 
с Windows.)  <a href=\"http://";
+#~ "cryptome.org/2013/08/fbi-hackers.htm\">Другие 
подробности</a>."
+
+#~ msgid ""
+#~ "I think that lawsuit is about a side issue. What the company does with "
+#~ "the data is a secondary issue. The principal wrong here is that the "
+#~ "company gets that data at all."
+#~ msgstr ""
+#~ "Я думаю, судебный процесс затрагивает 
побочную проблему. Что компания "
+#~ "делает с данными&nbsp;&mdash; вопрос 
второстепенный. Главная "
+#~ "несправедливость здесь состоит в том, 
что компания вообще получает эти "
+#~ "данные."
+
+#~ msgid ""
+#~ "I expect it implements DRM, too&mdash;that there is no way to save a "
+#~ "recording. But I can't be sure from the article."
+#~ msgstr ""
+#~ "Я не удивлюсь, если в нем реализовано и 
цифровое управление "
+#~ "ограничениями&nbsp;&mdash; т.е. сохранить 
запись невозможно. Но из статьи "
+#~ "это не следует."
+
+#~ msgid ""
 #~ "This page is licensed under a <a rel=\"license\" href=\"http://";
 #~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
 #~ "NoDerivatives 4.0 International License</a>."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- zh-tw.po    18 Sep 2019 10:02:32 -0000      1.142
+++ zh-tw.po    18 Sep 2019 16:01:43 -0000      1.143
@@ -435,10 +435,10 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1635,7 +1635,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
 "consequences extend to some additional people.  The fundamental wrong was to "
 "design the devices to depend on something else that didn't respect users' "
 "freedom."
@@ -2709,13 +2709,13 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2908,7 +2908,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
 "speech-recognition systems listen.  Both intrude on privacy."
 msgstr ""
 
@@ -3602,9 +3602,9 @@
 "(in an article blocked from us by a paywall) reports that <a href=\"http://";
 "www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
 "laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>.  (I suspect this means Windows "
-"laptops.)  Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm";
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops).  "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\";>more info</"
+"a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -4874,7 +4874,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
 "data is a secondary issue. The principal wrong here is that the company gets "
 "that data at all."
 msgstr ""
@@ -4934,8 +4934,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"I expect it implements DRM, too&mdash;that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too&mdash;that there is no way to save a "
+"recording. But we can't be sure from the article."
 msgstr ""
 
 #. type: Content of: <ul><li><p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]