www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sat, 19 Oct 2019 06:01:38 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/10/19 06:01:37

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.ru.po nl.po 
                         pl.po pot proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.es.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.210&r2=1.211
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.313&r2=1.314
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.479&r2=1.480
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.247&r2=1.248
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.573&r2=1.574
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.149&r2=1.150

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- de.po       16 Oct 2019 07:30:04 -0000      1.149
+++ de.po       19 Oct 2019 10:01:29 -0000      1.150
@@ -833,10 +833,6 @@
 "<a href=\"#tyrants\">Tyrannen</a><br />&#8209;&#160;Systeme, die jedes nicht "
 "vom Hersteller „autorisierte“ Betriebssystem zurückweisen."
 
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Hintertüren"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
@@ -916,7 +912,10 @@
 "\" class=\"transnote\">[2]</a>"
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Zensur"
 
 #. type: Content of: <p>
@@ -937,10 +936,6 @@
 "zwangsweise Zensur durch den <em>Apple Store</em>  einzuführen. Für weitere 
"
 "Informationen siehe den Abschnitt <a href=\"#jails\">Gefängnisse</a>."
 
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "DRM"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -1006,7 +1001,10 @@
 "gekauften Mediendateien abspielt</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr "Inkompatibilität"
 
 #. type: Content of: <p>
@@ -1080,7 +1078,10 @@
 "Aufbewahrung von Dokumenten als ungeeignet</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Unsicherheit"
 
 #. type: Content of: <p>
@@ -1183,7 +1184,10 @@
 "der Mobilfunksoftware von Mobiltelefonen</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Interferenz"
 
 #. type: Content of: <p>
@@ -1208,7 +1212,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Gefängnisse"
 
 #. type: Content of: <p>
@@ -1509,10 +1516,10 @@
 "der App selbst zensiert</a> wurde."
 
 #. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
+# | [-Apple Deception-]{+Manipulation+}
 #, fuzzy
 #| msgid "Apple Deception"
-msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr "Täuschung"
 
 #. type: Content of: <ul><li><p>
@@ -1542,7 +1549,10 @@
 
 # Handlungszwang?
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Zwang"
 
 #. type: Content of: <p>
@@ -1569,7 +1579,10 @@
 "man nicht Abonnent des Musikstreaming-Dienstes Apple Music ist."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Sabotage"
 
 #. type: Content of: <p>
@@ -1841,9 +1854,30 @@
 "href=\"/proprietary/proprietary-jails\">Apple-Zensur</a> gebilligte "
 "Applikationen. Scheinbar war das alles beabsichtigt."
 
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Überwachung"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -2331,7 +2365,10 @@
 "Apps gratis sind</a>)."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Tyrannen"
 
 #. type: Content of: <ul><li><p>
@@ -10107,6 +10144,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "
@@ -11276,19 +11336,19 @@
 "übers Ohr gehauen zu werden&#160;…"
 
 #. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
+# | directory list around [-3-]{+4+}00 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2017, the files in this directory list around 300 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
 "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt sind "
@@ -12964,6 +13024,59 @@
 "\">Tyrannische Software in Intel-Prozessoren eingebaut</a><a href=\"#tn01\" "
 "id=\"tn01-ref\" class=\"transnote\">[1]</a>."
 
+#~ msgid "Apple Back Doors"
+#~ msgstr "Hintertüren"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Zensur"
+
+#~ msgid "Apple DRM"
+#~ msgstr "DRM"
+
+#~ msgid "Apple Incompatibility"
+#~ msgstr "Inkompatibilität"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "Unsicherheit"
+
+#~ msgid "Apple Interference"
+#~ msgstr "Interferenz"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Gefängnisse"
+
+#, fuzzy
+#~| msgid "Apple Deception"
+#~ msgid "Apple Manipulation"
+#~ msgstr "Täuschung"
+
+# Handlungszwang?
+#~ msgid "Apple Pressuring"
+#~ msgstr "Zwang"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Sabotage"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Überwachung"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Tyrannen"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten 
"
+#~ "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt "
+#~ "sind (Stand 2017-04)."
+
 #~ msgid ""
 #~ "No game can run on the console unless the console's manufacturer has "
 #~ "authorized it.  Alas, I can't find a article to cite as a reference for "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.210
retrieving revision 1.211
diff -u -b -r1.210 -r1.211
--- es.po       16 Oct 2019 11:32:07 -0000      1.210
+++ es.po       19 Oct 2019 10:01:30 -0000      1.211
@@ -783,10 +783,6 @@
 "<a href=\"#tyrants\">Tiranos</a>: Son sistemas que rechazan cualquier "
 "sistema operativo que no esté «autorizado» por el fabricante."
 
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Puertas traseras de Apple"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
@@ -857,8 +853,11 @@
 "poder porque podemos confiar en Apple, sin lugar a dudas."
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
-msgstr "Censura de Apple"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
+msgstr "Censura"
 
 #. type: Content of: <p>
 msgid ""
@@ -870,10 +869,6 @@
 "censura mediante la Apple Store. Para más información, consulte la sección 
"
 "<a href=\"#jails\">Prisiones de Apple</a>."
 
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "Gestión digital de restricciones en Apple"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -941,8 +936,11 @@
 "vídeos que han adquirido</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
-msgstr "Incompatibilidad de Apple"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
+msgstr "Incompatibilidad"
 
 #. type: Content of: <p>
 msgid ""
@@ -1012,8 +1010,11 @@
 "api=v2\">inapropiados para la conservación de documentos</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
-msgstr "Falta de seguridad de Apple"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
+msgstr "Falta de seguridad"
 
 #. type: Content of: <p>
 msgid ""
@@ -1111,7 +1112,10 @@
 "\">multitud de agujeros en el software de radio de los teléfonos</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Interferencia de Apple"
 
 #. type: Content of: <p>
@@ -1140,8 +1144,11 @@
 "otras que no sean de Apple</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
-msgstr "Prisiones de Apple"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
+msgstr "Prisiones"
 
 #. type: Content of: <p>
 msgid ""
@@ -1454,11 +1461,11 @@
 "estaba censurando debido al asunto del que trataba</a>."
 
 #. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
+# | [-Apple-]Manipulation
 #, fuzzy
-#| msgid "Apple Deception"
-msgid "Apple Manipulation"
-msgstr "Trampas"
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
+msgstr "Manipulación"
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1482,8 +1489,11 @@
 "opción», pero en realidad serán muy pocos los que puedan hacerlo."
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
-msgstr "Presiones de Apple"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
+msgstr "Presiones"
 
 #. type: Content of: <p>
 msgid ""
@@ -1507,8 +1517,11 @@
 "Apple Music."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
-msgstr "Sabotaje de Apple"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
+msgstr "Sabotaje"
 
 #. type: Content of: <p>
 msgid ""
@@ -1733,9 +1746,30 @@
 "aplicaciones que <a href=\"/proprietary/proprietary-jails.html\">la censura "
 "de Apple</a> no aprueba. Al parecer, todo esto fue intencionado."
 
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Vigilancia de Apple"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 # | In spite of Apple's supposed commitment to privacy, iPhone apps contain
@@ -2107,8 +2141,11 @@
 "y recibir el código que Apple le envía."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
-msgstr "Tiranos de Apple"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
+msgstr "Tiranos"
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -9544,6 +9581,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "
@@ -10677,21 +10737,22 @@
 "de ser engañado."
 
 #. type: Content of: <p>
-# | As of April, 2019, the pages in this directory list around 400 instances
-# | of malicious functionalities (with more than 4[-0-]{+5+}0 references to
-# | back them up), but there are surely thousands more we don't know about.
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2019, the pages in this directory list around 400 instances "
-#| "of malicious functionalities (with more than 400 references to back them "
+#| "of malicious functionalities (with more than 450 references to back them "
 #| "up), but there are surely thousands more we don't know about."
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "Hasta abril de 2019, las páginas de este directorio ofrecían una lista de "
-"alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 400 "
+"alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 450 "
 "referencias de apoyo), pero seguramente hay miles más que desconocemos."
 
 #. type: Content of: <table><tr><th>
@@ -12213,6 +12274,58 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";> Los "
 "procesadores Intel incorporarán software tirano</a>."
 
+#~ msgid "Apple Back Doors"
+#~ msgstr "Puertas traseras de Apple"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Censura de Apple"
+
+#~ msgid "Apple DRM"
+#~ msgstr "Gestión digital de restricciones en Apple"
+
+#~ msgid "Apple Incompatibility"
+#~ msgstr "Incompatibilidad de Apple"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "Falta de seguridad de Apple"
+
+#~ msgid "Apple Interference"
+#~ msgstr "Interferencia de Apple"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Prisiones de Apple"
+
+#, fuzzy
+#~| msgid "Apple Deception"
+#~ msgid "Apple Manipulation"
+#~ msgstr "Trampas"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Presiones de Apple"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Sabotaje de Apple"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Vigilancia de Apple"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Tiranos de Apple"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the pages in this directory list around 400 instances "
+#~| "of malicious functionalities (with more than 400 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Hasta abril de 2019, las páginas de este directorio ofrecían una lista 
de "
+#~ "alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 400 "
+#~ "referencias de apoyo), pero seguramente hay miles más que desconocemos."
+
 #~ msgid ""
 #~ "Apple has <a href=\"https://www.theregister.co.uk/2019/10/02/";
 #~ "apple_hong_kong/\"> banned the app that Hong Kong protesters use to "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- fr.po       16 Oct 2019 10:47:17 -0000      1.259
+++ fr.po       19 Oct 2019 10:01:30 -0000      1.260
@@ -719,10 +719,6 @@
 "<a href=\"#tyrants\">Tyrans</a> – systèmes qui rejettent tout système "
 "d'exploitation non « autorisé » par le fabricant."
 
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Portes dérobées"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
@@ -795,7 +791,10 @@
 "possède ce pouvoir, car naturellement nous pouvons lui faire confiance."
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Censure"
 
 #. type: Content of: <p>
@@ -808,10 +807,6 @@
 "censure par l'intermédiaire de l'Apple Store. Pour plus de détails, 
reportez-"
 "vous à la section <a href=\"#jails\">Prisons</a>."
 
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "DRM"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -879,7 +874,10 @@
 "vidéos qu'ils ont achetées</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr "Incompatibilité"
 
 #. type: Content of: <p>
@@ -949,7 +947,10 @@
 "api=v2\">impropres à la conservation des documents</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Insécurité"
 
 #. type: Content of: <p>
@@ -1038,7 +1039,10 @@
 "bogues dans le logiciel de radio des téléphones</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Ingérence"
 
 #. type: Content of: <p>
@@ -1067,7 +1071,10 @@
 "par des tiers</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Prisons"
 
 #. type: Content of: <p>
@@ -1371,7 +1378,10 @@
 "censurée à cause de son thème</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Manipulation"
+# | [-Apple-]Manipulation
+#, fuzzy
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr "Manipulation"
 
 #. type: Content of: <ul><li><p>
@@ -1397,7 +1407,10 @@
 "comprendront comment le faire."
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Pression sur le client"
 
 #. type: Content of: <p>
@@ -1422,7 +1435,10 @@
 "sur la popularité des chansons si vous n'êtes pas abonné à Apple Miusic."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Sabotage"
 
 #. type: Content of: <p>
@@ -1623,9 +1639,30 @@
 "applications non validées par la <a href=\"/proprietary/proprietary-jails."
 "html\">censure d'Apple</a>. Tout ceci était apparemment intentionnel."
 
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Surveillance"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1974,7 +2011,10 @@
 "et recevoir le code de vérification envoyé dessus par Apple."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Tyrans"
 
 #. type: Content of: <ul><li><p>
@@ -8750,6 +8790,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "
@@ -9722,10 +9785,19 @@
 "typiquement un moyen de mal se conduire."
 
 #. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "En avril 2019, les pages de ce répertoire dénombraient à peu près 400 cas 
de "
 "fonctionnalités malveillante (appuyés par plus de 450 références), mais 
il y "
@@ -11093,3 +11165,48 @@
 msgstr ""
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>Les "
 "processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid "Apple Back Doors"
+#~ msgstr "Portes dérobées"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Censure"
+
+#~ msgid "Apple DRM"
+#~ msgstr "DRM"
+
+#~ msgid "Apple Incompatibility"
+#~ msgstr "Incompatibilité"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "Insécurité"
+
+#~ msgid "Apple Interference"
+#~ msgstr "Ingérence"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Prisons"
+
+#~ msgid "Apple Manipulation"
+#~ msgstr "Manipulation"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Pression sur le client"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Sabotage"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Surveillance"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Tyrans"
+
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "En avril 2019, les pages de ce répertoire dénombraient à peu près 400 
cas "
+#~ "de fonctionnalités malveillante (appuyés par plus de 450 références), "
+#~ "mais il y en a sûrement des milliers d'autres dont nous ne savons rien."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- it.po       16 Oct 2019 07:30:04 -0000      1.149
+++ it.po       19 Oct 2019 10:01:30 -0000      1.150
@@ -781,10 +781,6 @@
 "<a href=\"#tyrants\">Tiranni</a>&mdash;sistemi che vietano l'installazione "
 "di sistemi operativi non “autorizzati” dal produttore."
 
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Backdoor di Apple"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
@@ -871,7 +867,10 @@
 "potere perché di Apple ci si può fidare, eccome."
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Censura di Apple"
 
 #. type: Content of: <p>
@@ -881,10 +880,6 @@
 "section for more information."
 msgstr ""
 
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "DRM di Apple"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -952,10 +947,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-# | Apple [-Insecurity-] {+Incompatibility+}
+# | [-Apple Insecurity-]{+Incompatibility+}
 #, fuzzy
 #| msgid "Apple Insecurity"
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr "Mancata sicurezza di Apple"
 
 #. type: Content of: <p>
@@ -1002,7 +997,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Mancata sicurezza di Apple"
 
 #. type: Content of: <p>
@@ -1109,7 +1107,10 @@
 "programmi di radiocomunicazione dei telefoni</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Interferenza di Apple"
 
 #. type: Content of: <p>
@@ -1133,7 +1134,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Prigioni di Apple"
 
 #. type: Content of: <p>
@@ -1527,10 +1531,10 @@
 "drone-strikes/\">solo per il tema di cui trattava</a>."
 
 #. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
+# | [-Apple Deception-]{+Manipulation+}
 #, fuzzy
 #| msgid "Apple Deception"
-msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr "Inganni di Apple"
 
 #. type: Content of: <ul><li><p>
@@ -1556,7 +1560,10 @@
 "come farlo."
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Pressioni di Apple"
 
 #. type: Content of: <p>
@@ -1581,7 +1588,10 @@
 "classifiche musicali se non siete iscritti ad Apple Music."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Sabotaggio di Apple"
 
 #. type: Content of: <p>
@@ -1825,9 +1835,30 @@
 "dalla <a href=\"/proprietary/proprietary-jails.html\">censura di Apple</a>. "
 "Tutto questo era apparentemente intenzionale."
 
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Sorveglianza di Apple"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -2255,7 +2286,10 @@
 "che Apple invia a tale indirizzo."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Tiranni di Apple"
 
 #. type: Content of: <ul><li><p>
@@ -9450,6 +9484,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "
@@ -10522,19 +10579,19 @@
 "norma. Il software proprietario moderno è tipicamente una fregatura."
 
 #. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
+# | directory list around [-3-]{+4+}00 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2017, the files in this directory list around 300 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
 "ma sicuramente ce ne sono altre migliaia che ancora non conosciamo."
@@ -12213,6 +12270,60 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>I "
 "processori Intel avranno del software tiranno preinstallato</a>."
 
+#~ msgid "Apple Back Doors"
+#~ msgstr "Backdoor di Apple"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Censura di Apple"
+
+#~ msgid "Apple DRM"
+#~ msgstr "DRM di Apple"
+
+#, fuzzy
+#~| msgid "Apple Insecurity"
+#~ msgid "Apple Incompatibility"
+#~ msgstr "Mancata sicurezza di Apple"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "Mancata sicurezza di Apple"
+
+#~ msgid "Apple Interference"
+#~ msgstr "Interferenza di Apple"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Prigioni di Apple"
+
+#, fuzzy
+#~| msgid "Apple Deception"
+#~ msgid "Apple Manipulation"
+#~ msgstr "Inganni di Apple"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Pressioni di Apple"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Sabotaggio di Apple"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Sorveglianza di Apple"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Tiranni di Apple"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità "
+#~ "malevole, ma sicuramente ce ne sono altre migliaia che ancora non "
+#~ "conosciamo."
+
 #, fuzzy
 #~| msgid ""
 #~| "Game consoles are jails, too: no game can run on the console unless the "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- ja.po       16 Oct 2019 07:30:04 -0000      1.156
+++ ja.po       19 Oct 2019 10:01:30 -0000      1.157
@@ -657,10 +657,6 @@
 "<a 
href=\"#tyrants\">暴君</a>&mdash;メーカによって「承認」されていないオペ"
 "レーティング・システムを拒絶するシステム。"
 
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Appleのバックドア"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
@@ -731,7 +727,9 @@
 "す。"
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Appleの検閲"
 
 #. type: Content of: <p>
@@ -741,10 +739,6 @@
 "section for more information."
 msgstr ""
 
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "AppleのDRM"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -801,7 +795,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr ""
 
 #. type: Content of: <p>
@@ -849,7 +843,7 @@
 
 #. type: Content of: <h3>
 #, fuzzy
-msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Appleの危険性"
 
 #. type: Content of: <p>
@@ -923,7 +917,7 @@
 #. type: Content of: <h3>
 #, fuzzy
 #| msgid "Apple Surveillance"
-msgid "Apple Interference"
+msgid "Interference"
 msgstr "Appleの監視"
 
 #. type: Content of: <p>
@@ -947,7 +941,9 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Appleの牢獄"
 
 #. type: Content of: <p>
@@ -1203,7 +1199,7 @@
 "検閲していることを認めました</a>。"
 
 #. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1229,7 +1225,9 @@
 "証します。"
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Appleの圧力"
 
 #. type: Content of: <p>
@@ -1253,7 +1251,9 @@
 "を提供することを拒絶します</a>、Apple Musicの購読者
でない場合。"
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Appleの妨害"
 
 #. type: Content of: <p>
@@ -1421,9 +1421,30 @@
 
"閲</a>によって承認されていないアプリケーションを停止もしました。これは明らか"
 "にすべて意図的です。"
 
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Appleの監視"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1738,7 +1759,9 @@
 "ん。"
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Appleの暴君"
 
 #. type: Content of: <ul><li><p>
@@ -7298,6 +7321,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "
@@ -8183,9 +8229,9 @@
 #| "instances of malicious functionalities, but there are surely thousands "
 #| "more we don't know about."
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 
"2017年1月時点で、ここには、約260の異なる悪意のある機能の実例が掲載されていま"
 
"すが、確実にわたしたちが知らない何千もの例があるでしょう。"
@@ -9546,6 +9592,52 @@
 "<a 
href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>インテルの"
 
"プロセッサには暴君ソフトウェアが組み込まれるようになります</a>。"
 
+#~ msgid "Apple Back Doors"
+#~ msgstr "Appleのバックドア"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Appleの検閲"
+
+#~ msgid "Apple DRM"
+#~ msgstr "AppleのDRM"
+
+#, fuzzy
+#~ msgid "Apple Insecurity"
+#~ msgstr "Appleの危険性"
+
+#, fuzzy
+#~| msgid "Apple Surveillance"
+#~ msgid "Apple Interference"
+#~ msgstr "Appleの監視"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Appleの牢獄"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Appleの圧力"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Appleの妨害"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Appleの監視"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Appleの暴君"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of January, 2017, the files in this directory list around 260 "
+#~| "instances of malicious functionalities, but there are surely thousands "
+#~| "more we don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ 
"2017年1月時点で、ここには、約260の異なる悪意のある機能の実例が掲載されてい"
+#~ 
"ますが、確実にわたしたちが知らない何千もの例があるでしょう。"
+
 #~ msgid ""
 #~ "No game can run on the console unless the console's manufacturer has "
 #~ "authorized it.  Alas, I can't find a article to cite as a reference for "

Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- malware-apple.de-diff.html  16 Oct 2019 07:30:04 -0000      1.49
+++ malware-apple.de-diff.html  19 Oct 2019 10:01:30 -0000      1.50
@@ -87,7 +87,7 @@
 &lt;/ul&gt;
 &lt;/div&gt;
 
-&lt;h3 id="back-doors"&gt;Apple Back Doors&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="back-doors"&gt;Apple 
Back</strong></del></span> <span 
class="inserted"><ins><em>id="back-doors"&gt;Back</em></ins></span> 
Doors&lt;/h3&gt;
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;&lt;p&gt;
 Mac</strong></del></span>
@@ -145,7 +145,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="censorship"&gt;Apple 
Censorship&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="censorship"&gt;Censorship&lt;/h3&gt;</em></ins></span>
 
 &lt;p&gt;Apple mainly uses iOS, which is a typical jail, to impose censorship
 through the Apple Store. Please refer to <span 
class="inserted"><ins><em>the</em></ins></span> &lt;a href="#jails"&gt;Apple 
Jails&lt;/a&gt;
@@ -155,7 +155,7 @@
 &lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
-  they do not count as malware. We mention them to 
refute</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
+  they do not count as malware. We mention them to 
refute</strong></del></span> <span 
class="inserted"><ins><em>id="drm"&gt;DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908150.1"&gt;
@@ -226,7 +226,7 @@
 
 &lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;
 
-&lt;p&gt;Proprietary companies can take advantage</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
+&lt;p&gt;Proprietary companies can take advantage</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Incompatibility&lt;/h3&gt;
 
 &lt;p&gt;In this section, we list characteristics</em></ins></span> of <span 
class="removed"><del><strong>their customers by imposing arbitrary 
limits</strong></del></span> <span class="inserted"><ins><em>Apple programs 
that block or
 hinder users from switching</em></ins></span> to <span 
class="removed"><del><strong>their use of</strong></del></span> <span 
class="inserted"><ins><em>any alternative program&mdash;and, in
@@ -308,7 +308,7 @@
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+&lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest 
of</em></ins></span> the <span 
class="removed"><del><strong>user's</strong></del></span> file <span 
class="removed"><del><strong>system for music files, 
copies</strong></del></span>
   <span class="inserted"><ins><em>they do not count as malware. We 
mention</em></ins></span> them to <span class="removed"><del><strong>an Apple
@@ -318,24 +318,24 @@
   &lt;li&gt;
     &lt;p&gt;Apple &lt;a
 
href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-stops users from fixing</strong></del></span> <span 
class="inserted"><ins><em>refute</em></ins></span> the <span 
class="removed"><del><strong>security bugs</strong></del></span>
+stops users from fixing</strong></del></span> <span 
class="inserted"><ins><em>refute</em></ins></span> the <span 
class="removed"><del><strong>security bugs in Quicktime for
+      Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;iOS version 9 for
+    iThings</strong></del></span>
   <span class="inserted"><ins><em>supposition that prestigious proprietary 
software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908310"&gt;
-    &lt;p&gt;A series of vulnerabilities &lt;a
-    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found</em></ins></span>
-    in <span class="removed"><del><strong>Quicktime for
-      Windows&lt;/a&gt;, while refusing</strong></del></span> <span 
class="inserted"><ins><em>iOS allowed attackers</em></ins></span> to <span 
class="removed"><del><strong>fix them itself.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;iOS version 9 for
-    iThings &lt;a 
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    &lt;p&gt;A series of vulnerabilities</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
     Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from</strong></del></span> <span class="inserted"><ins><em>gain 
access to sensitive information
+    criticism from</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
     including private messages, passwords, photos and contacts stored 
on</em></ins></span>
     the <span class="removed"><del><strong>users. However, it has not 
acknowledged</strong></del></span> <span class="inserted"><ins><em>user's 
iMonster&lt;/a&gt;.&lt;/p&gt;
 
@@ -411,7 +411,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;h3 id="interference"&gt;Interference&lt;/h3&gt;
 &lt;p&gt;Various proprietary programs often mess</em></ins></span> up <span 
class="inserted"><ins><em>the user's system. They
   are like sabotage, but they are not grave enough</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
       Any edits you make</strong></del></span> <span 
class="inserted"><ins><em>qualify for the
@@ -434,44 +434,41 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;h3 id="jails"&gt;Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
 iOS,</em></ins></span> the
       <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>operating system</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
       &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>the 
Apple iThings,</em></ins></span> is <span class="inserted"><ins><em>the 
prototype
-of</em></ins></span> a <span class="removed"><del><strong>way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>the 
Apple iThings,</em></ins></span> is <span class="removed"><del><strong>a way to 
&lt;a href="https://support.apple.com/en-us/HT201104"&gt;
       deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
       surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>jail&lt;/a&gt;.  It was Apple that introduced 
the practice</em></ins></span> of <span class="removed"><del><strong>this to
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>the prototype</em></ins></span>
+of <span class="removed"><del><strong>this to
       &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span>
-<span class="inserted"><ins><em>designing general purpose computers with 
censorship</em></ins></span> of <span class="removed"><del><strong>many 
celebrities&lt;/a&gt;. They needed</strong></del></span> <span 
class="inserted"><ins><em>application
+      nude photos</strong></del></span> <span class="inserted"><ins><em>a 
jail&lt;/a&gt;.  It was Apple that introduced the practice</em></ins></span> of 
<span class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to 
break Apple's
+      security to get at them, but NSA can access any</strong></del></span>
+<span class="inserted"><ins><em>designing general purpose computers with 
censorship</em></ins></span> of <span class="removed"><del><strong>them 
through</strong></del></span> <span class="inserted"><ins><em>application
 programs.&lt;/p&gt;
 
-&lt;p&gt;Here is an article about the &lt;a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-code signing&lt;/a&gt; that the iThings use</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>lock up 
the user.&lt;/p&gt;
-
-&lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any of 
them</strong></del></span> <span class="inserted"><ins><em>allow limited 
passage</em></ins></span> through
-      <span class="removed"><del><strong>&lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+&lt;p&gt;Here is an article about the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
-  MacOS automatically sends</strong></del></span> <span 
class="inserted"><ins><em>the
+  MacOS automatically sends</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+code signing&lt;/a&gt; that the iThings use</em></ins></span> to <span 
class="removed"><del><strong>Apple servers unsaved documents being
+  edited&lt;/a&gt;. The</strong></del></span> <span 
class="inserted"><ins><em>lock up the user.&lt;/p&gt;
+
+&lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
 walls of the iThing jail: users can now install apps built from
 source code, provided the source code is written in Swift.  Users
-cannot do this freely because they are required</em></ins></span> to <span 
class="removed"><del><strong>Apple servers unsaved documents being
-  edited&lt;/a&gt;. The</strong></del></span> <span 
class="inserted"><ins><em>identify
-themselves.</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
-  things you have</strong></del></span> <span 
class="inserted"><ins><em>href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this is a crack in the prison walls, it 
is</em></ins></span> not <span 
class="removed"><del><strong>decided</strong></del></span>
-<span class="inserted"><ins><em>big enough</em></ins></span> to <span 
class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>mean that the iThings</em></ins></span> are <span 
class="removed"><del><strong>even more sensitive than</strong></del></span> 
<span class="inserted"><ins><em>no longer jails.&lt;/p&gt;
+cannot do this freely because they are required to identify
+themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
+are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
+big enough to mean that the iThings are no longer jails.&lt;/p&gt;
 
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 
@@ -479,30 +476,23 @@
   &lt;li id="M201910100"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theguardian.com/world/2019/oct/10/hong-kong-protests-apple-pulls-tracking-app-after-china-criticism"&gt;
-    banned</em></ins></span> the
-  <span class="removed"><del><strong>things you have stored in 
files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app that Hong Kong protesters use to 
communicate&lt;/a&gt;.&lt;/p&gt;
+    banned the app that Hong Kong protesters use to 
communicate&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Obeying the &ldquo;local laws&rdquo; about what people can do with
-    software is no excuse for censoring what software people can 
use.&lt;/p&gt;</em></ins></span>
+    software is no excuse for censoring what software people can use.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple has made 
various</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201910070"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
-  MacOS programs send files</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"&gt;
+  &lt;li id="M201910070"&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"&gt;
     censors the Taiwan flag in iOS&lt;/a&gt; on behalf of the Chinese
-    government. When the region is set</em></ins></span> to <span 
class="removed"><del><strong>Apple servers without asking permission&lt;/a&gt;.
-  This exposes</strong></del></span> <span class="inserted"><ins><em>Hong 
Kong, this flag is not
-    visible in</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>emoji selection widget but is still accessible. When 
the
-    region is set</em></ins></span> to <span class="removed"><del><strong>Big 
Brother and perhaps</strong></del></span> <span 
class="inserted"><ins><em>mainland China, all attempts</em></ins></span> to 
<span class="removed"><del><strong>other snoops.&lt;/p&gt;
-
-  &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>display it 
will result
+    government. When the region is set to Hong Kong, this flag is not
+    visible in the emoji selection widget but is still accessible. When the
+    region is set to mainland China, all attempts to display it will result
     in the &ldquo;empty emoji&rdquo; icon as if the flag never 
existed.&lt;/p&gt;
 
     &lt;p&gt;Thus, not only does Apple use the App Store as an instrument
-    of censorship, it</em></ins></span> also <span 
class="removed"><del><strong>demonstrates</strong></del></span> <span 
class="inserted"><ins><em>uses the iThing operating system for that
+    of censorship, it also uses the iThing operating system for that
     purpose.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -510,11 +500,10 @@
     &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
-    companies from figuring out</em></ins></span> how <span 
class="removed"><del><strong>you can't trust proprietary software,
-  because</strong></del></span> <span class="inserted"><ins><em>those attacks 
work.&lt;/p&gt;
+    companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable</em></ins></span> even if <span 
class="removed"><del><strong>today's version doesn't</strong></del></span> 
<span class="inserted"><ins><em>it didn't lead to security threats as 
well.&lt;/p&gt;
+    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710130"&gt;
@@ -592,280 +581,279 @@
     not be allowed to censor apps.  Even if Apple carried out this act of
     censorship with some care, it would still be wrong.  Whether racism
     is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not</em></ins></span> have <span 
class="removed"><del><strong>a malicious
-  functionality, tomorrow's version might add it. The developer won't
-  remove</strong></del></span> the <span 
class="removed"><del><strong>malfeature unless many users push back 
hard,</strong></del></span> <span class="inserted"><ins><em>power to impose its 
views
+    the real issue.  Apple should not have the power to impose its views
     about either of these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>the users
-  can't remove it themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various 
operations</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power</em></ins></span> in
-  <span class="removed"><del><strong>&lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
-  the latest MacOS send reports</strong></del></span> <span 
class="inserted"><ins><em>2014</em></ins></span> to <span 
class="removed"><del><strong>Apple&lt;/a&gt; servers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in MacOS:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple admits</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the
-  <span class="removed"><del><strong>&lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
-  spying in a search facility&lt;/a&gt;, but there's</strong></del></span> 
<span class="inserted"><ins><em>iThings for</em></ins></span> a <span 
class="removed"><del><strong>lot</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
-  more snooping that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+  &lt;li id="M201405250"&gt;
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
+    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
-    about other crimes such as killing people.  Perhaps</em></ins></span> 
Apple <span class="removed"><del><strong>has not talked 
about&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>considers
-    killing more acceptable than marijuana.&lt;/p&gt;</em></ins></span>
+    about other crimes such as killing people.  Perhaps Apple considers
+    killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-  Several &ldquo;features&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed the 
locations</em></ins></span>
-    of <span class="removed"><del><strong>iOS seem to exist for no possible
-  purpose other than surveillance&lt;/a&gt;.  Here is</strong></del></span> 
<span class="inserted"><ins><em>US drone assassinations, giving various 
excuses. Each
-    time</em></ins></span> the <span class="removed"><del><strong>&lt;a
-  
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-  Technical presentation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;The &lt;a class="not-a-duplicate"
-  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  iBeacon&lt;/a&gt; lets stores determine exactly where</strong></del></span> 
<span class="inserted"><ins><em>developers fixed one &ldquo;problem&rdquo;, 
Apple
-    complained about another.  After</em></ins></span> the <span 
class="removed"><del><strong>iThing is, and
-  get other info too.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>fifth rejection, Apple</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones for</strong></del></span>
+  &lt;li id="M201402070"&gt;
+    &lt;p&gt;Apple rejected an app that displayed the locations
+    of US drone assassinations, giving various excuses. Each
+    time the developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, 
Apple</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  things you have not decided to save are even more sensitive 
than</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved with
-  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>app based on the subject matter&lt;/a&gt;.&lt;/p&gt;
+    admitted it was censoring</em></ins></span> the
+  <span class="removed"><del><strong>things you have stored in 
files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple has made 
various</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;h3 id="manipulation"&gt;Apple Manipulation&lt;/h3&gt;
+&lt;h3 id="manipulation"&gt;Manipulation&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not as much</strong></del></span>
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users, or make option settings hard
-    to find&lt;/a&gt;.&lt;/p&gt;
+    interfaces designed to mislead users, or make option settings 
hard</em></ins></span>
+    to <span class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as</em></ins></span> Apple <span 
class="removed"><del><strong>servers without asking permission&lt;/a&gt;.
+  This exposes the files</strong></del></span> to <span 
class="removed"><del><strong>Big Brother and perhaps</strong></del></span> 
<span class="inserted"><ins><em>say, &ldquo;We allow users</em></ins></span>
+    to <span class="removed"><del><strong>other snoops.&lt;/p&gt;
 
-    &lt;p&gt;This allows a company such</em></ins></span> as Apple <span 
class="removed"><del><strong>claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+  &lt;p&gt;It also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>turn this off&rdquo; while ensuring that few will 
understand</em></ins></span> how <span class="removed"><del><strong>you can't 
trust proprietary software,
+  because even if today's version doesn't have a malicious
+  functionality, tomorrow's version might add it. The developer won't
+  remove the malfeature unless many users push back hard, and the users
+  can't remove</strong></del></span>
+    <span class="inserted"><ins><em>to actually turn</em></ins></span> it 
<span class="removed"><del><strong>themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations in
+  &lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
-&lt;h3 <span class="removed"><del><strong>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics</strong></del></span> <span 
class="inserted"><ins><em>id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+&lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;
 
-&lt;p&gt;Proprietary companies can take advantage</em></ins></span> of <span 
class="removed"><del><strong>Apple programs that block or
-hinder users from switching to any alternative program&mdash;and, in
-particular, from switching</strong></del></span> <span 
class="inserted"><ins><em>their customers by imposing arbitrary 
limits</em></ins></span> to <span class="removed"><del><strong>free software 
which can liberate the device</strong></del></span> <span 
class="inserted"><ins><em>their use of</em></ins></span> the <span 
class="removed"><del><strong>software runs on.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>software.  
This section reports examples of hard sell and other unjust commercial tactics 
by Apple.&lt;/p&gt;
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send</strong></del></span> <span 
class="inserted"><ins><em>software.  This section</em></ins></span> reports 
<span class="inserted"><ins><em>examples of hard sell and other unjust 
commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201510270"&gt;</em></ins></span>
-    &lt;p&gt;Apple <span class="removed"><del><strong>devices lock users 
in</strong></del></span> <span class="inserted"><ins><em>Siri</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-solely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
-    to <span class="inserted"><ins><em>give you information&lt;/a&gt; about 
music charts if you're not an</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt; by being designed to be 
incompatible with all
-other options, ethical or unethical.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>Music 
subscriber.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201510270"&gt;
+    &lt;p&gt;Apple Siri &lt;a
+    
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
+    to <span class="removed"><del><strong>Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>give 
you information&lt;/a&gt; about music charts if you're not an Apple
+    Music subscriber.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;iWork (office software</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
+&lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;
 
-&lt;p&gt;These are situations in which Apple employs its power over users
-to directly intervene in ways</em></ins></span> that <span 
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
-formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means
-of converting</strong></del></span> <span 
class="inserted"><ins><em>harm</em></ins></span> them <span 
class="removed"><del><strong>to</strong></del></span> or <span 
class="removed"><del><strong>from Open Document Formats&lt;/a&gt;. iWork formats
-have changed several times since they were first introduced. This may have
-had the effect</strong></del></span> <span class="inserted"><ins><em>block 
their work.&lt;/p&gt;
+&lt;p&gt;These are situations</em></ins></span> in <span 
class="removed"><del><strong>MacOS:
+  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms</strong></del></span> 
<span class="inserted"><ins><em>which Apple employs its power over 
users</em></ins></span>
+to <span class="removed"><del><strong>Apple.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple admits the
+  &lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+  spying</strong></del></span> <span class="inserted"><ins><em>directly 
intervene</em></ins></span> in <span class="removed"><del><strong>a search 
facility&lt;/a&gt;, but there's a lot
+  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
+  more snooping</strong></del></span> <span 
class="inserted"><ins><em>ways</em></ins></span> that <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When Apple suspects a user</em></ins></span> of <span 
class="removed"><del><strong>thwarting &lt;a
-href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
-efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
-
-&lt;p&gt;iWork formats are considered &lt;a
-href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
-unfit for document preservation&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+    &lt;p&gt;When</em></ins></span> Apple <span 
class="removed"><del><strong>has not talked about&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;In MacOS and iOS,</strong></del></span> <span 
class="inserted"><ins><em>fraud, it
-    judges</em></ins></span> the <span class="removed"><del><strong>procedure 
for &lt;a
-href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-converting images from</strong></del></span> <span 
class="inserted"><ins><em>case secretly and presents</em></ins></span> the 
<span class="removed"><del><strong>Photos 
format&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>verdict
-    as a fait accompli.  The punishment</em></ins></span> to a <span 
class="removed"><del><strong>free format</strong></del></span> <span 
class="inserted"><ins><em>user found guilty &lt;a
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+  Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>suspects a user</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>fraud, it
+    judges the case secretly and presents the verdict
+    as a fait accompli.  The punishment</em></ins></span> to <span 
class="removed"><del><strong>exist</strong></del></span> <span 
class="inserted"><ins><em>a user found guilty &lt;a
     
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
-    being cut off for life, which more-or-less cripples the user's Apple
-    devices forever&lt;/a&gt;.  There</em></ins></span> is <span 
class="removed"><del><strong>so tedious</strong></del></span> <span 
class="inserted"><ins><em>no appeal.&lt;/p&gt;
+    being cut off</em></ins></span> for <span class="removed"><del><strong>no 
possible
+  purpose other than surveillance&lt;/a&gt;.  Here is</strong></del></span> 
<span class="inserted"><ins><em>life, which more-or-less 
cripples</em></ins></span> the <span class="removed"><del><strong>&lt;a
+  
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+  Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's Apple
+    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810240"&gt;
-    &lt;p&gt;Apple</em></ins></span> and <span 
class="removed"><del><strong>time-consuming that users just give up if they 
have a lot</strong></del></span> <span class="inserted"><ins><em>Samsung 
deliberately &lt;a
-    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
-    the performance</em></ins></span> of <span 
class="removed"><del><strong>them.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>older phones to force users to buy their newer
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810240"&gt;
+    &lt;p&gt;Apple and Samsung deliberately</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  iBeacon&lt;/a&gt; lets stores determine exactly where</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
+    the <span class="removed"><del><strong>iThing is, and
+  get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>performance of older phones to force users to buy 
their newer
     phones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iTunes videos have DRM, which allows</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201805310"&gt;
-    &lt;p&gt;Apple has &lt;a
-    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple has</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram</em></ins></span> from <span 
class="removed"><del><strong>iPhones</strong></del></span> <span 
class="inserted"><ins><em>upgrading its app</em></ins></span> for <span 
class="removed"><del><strong>the state&lt;/a&gt;.
+  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
month&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span class="removed"><del><strong>may have 
improved</strong></del></span> <span class="inserted"><ins><em>evidently has to 
do</em></ins></span> with
+  <span class="removed"><del><strong>&lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
 
-    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple to <span class="inserted"><ins><em>block
-    Telegram in Russia.&lt;/p&gt;
+&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
 
-    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+&lt;p&gt;In this section, we list characteristics of</strong></del></span> 
<span class="inserted"><ins><em>Russia's command to</em></ins></span> Apple 
<span class="removed"><del><strong>programs that block or
+hinder users from switching</strong></del></span> to <span 
class="removed"><del><strong>any alternative 
program&mdash;and,</strong></del></span> <span class="inserted"><ins><em>block
+    Telegram</em></ins></span> in
+<span class="removed"><del><strong>particular, from switching 
to</strong></del></span> <span class="inserted"><ins><em>Russia.&lt;/p&gt;
+
+    &lt;p&gt;The Telegram client is</em></ins></span> free software <span 
class="removed"><del><strong>which can liberate the device
+the software runs on.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;Apple devices lock users in</strong></del></span> <span 
class="inserted"><ins><em>on other platforms, but not on
     iThings. Since</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its customers can
-  watch the videos</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
-    are jails&lt;/a&gt;,</em></ins></span> they <span 
class="removed"><del><strong>purchased&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>don't permit any app to be free 
software.&lt;/p&gt;</em></ins></span>
+<span 
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+solely</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
+    are jails&lt;/a&gt;, they don't permit any app</em></ins></span> to <span 
class="removed"><del><strong>Apple services&lt;/a&gt; by being 
designed</strong></del></span> <span class="inserted"><ins><em>be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
DMCA</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot 
drives,</em></ins></span> and <span class="removed"><del><strong>the EU 
Copyright Directive make it</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes</em></ins></span> the <span class="removed"><del><strong>iOS 
DRM.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>file 
system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of 
MacOS.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201710044"&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
+    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    changes the file system from HFS+</em></ins></span>  to <span 
class="inserted"><ins><em>APFS&lt;/a&gt;, which cannot</em></ins></span> be 
<span class="removed"><del><strong>incompatible with all
+other options, ethical</strong></del></span>
+    <span class="inserted"><ins><em>accessed from GNU/Linux, 
Windows</em></ins></span> or <span 
class="removed"><del><strong>unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even older versions of 
MacOS.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a
-  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
+formats and</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201706060"&gt;
-    &lt;p&gt;Apple will stop &lt;a
-    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
+    &lt;p&gt;Apple will stop</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile,</em></ins></span> Apple <span 
class="removed"><del><strong>uses DRM software to prevent</strong></del></span> 
<span class="inserted"><ins><em>stops</em></ins></span> people from <span 
class="removed"><del><strong>charging an iThing with a 
-  generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;&lt;a
-  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-  DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-  focuses on</strong></del></span> <span class="inserted"><ins><em>fixing 
problems themselves;
-    that's</em></ins></span> the <span class="removed"><del><strong>fact that 
a new model</strong></del></span> <span 
class="inserted"><ins><em>nature</em></ins></span> of <span 
class="removed"><del><strong>Macbook introduced a requirement
-  for monitors to have malicious hardware, but DRM software in MacOS is
-  involved in activating the hardware. The software for accessing iTunes
-  is also responsible.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>proprietary software.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
+    that's the nature</em></ins></span> of <span 
class="removed"><del><strong>converting them</strong></del></span> <span 
class="inserted"><ins><em>proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704070"&gt;
+  &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains</em></ins></span> DRM <span 
class="removed"><del><strong>that caters</strong></del></span> <span 
class="inserted"><ins><em>specifically designed</em></ins></span> to <span 
class="removed"><del><strong>Bluray disks&lt;/a&gt;.  
(The</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    iPhone 7 contains DRM specifically designed to &lt;a
     
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>focused on Windows
-  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;</em></ins></span>
+    to <span class="removed"><del><strong>or from Open Document 
Formats&lt;/a&gt;. iWork formats
+have changed several times since they were first introduced. This may have
+had</strong></del></span> <span 
class="inserted"><ins><em>describe</em></ins></span> the <span 
class="removed"><del><strong>effect of thwarting &lt;a
+href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
+efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
 
-&lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS,</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>operating system of</strong></del></span> <span 
class="inserted"><ins><em>term &ldquo;lock&rdquo;
-    to describe</em></ins></span> the <span class="removed"><del><strong>Apple 
iThings, is</strong></del></span> <span class="inserted"><ins><em>DRM, but we 
prefer to use</em></ins></span> the <span class="removed"><del><strong>prototype
-of a jail&lt;/a&gt;.  It was</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
-    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
-    handcuffs&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;iWork formats are considered</strong></del></span> <span 
class="inserted"><ins><em>DRM, but we prefer to use the term</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
+unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"&gt;
 digital
+    handcuffs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201606080"&gt;
-    &lt;p&gt;Apple &lt;a
-    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-    stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
-    while refusing to fix them itself.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;In MacOS and iOS, the procedure for</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
+    &lt;p&gt;Apple</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
+converting images</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+    stops users</em></ins></span> from <span 
class="inserted"><ins><em>fixing</em></ins></span> the <span 
class="removed"><del><strong>Photos format&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>security bugs in Quicktime for 
Windows&lt;/a&gt;,
+    while refusing</em></ins></span> to <span class="removed"><del><strong>a 
free format is so tedious
+and time-consuming that users just give up if they have a lot of 
them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>fix them 
itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201605040"&gt;
-    &lt;p&gt;The</em></ins></span> Apple <span 
class="removed"><del><strong>that introduced</strong></del></span> <span 
class="inserted"><ins><em>Music client program &lt;a
-    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
-    the <span class="removed"><del><strong>practice of
-designing general purpose computers with censorship of application
-programs.&lt;/p&gt;
+&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;iTunes videos have DRM, which allows</strong></del></span>
 
-&lt;p&gt;Here is</strong></del></span> <span class="inserted"><ins><em>user's 
file system for music files, copies them to</em></ins></span> an <span 
class="removed"><del><strong>article about the</strong></del></span> <span 
class="inserted"><ins><em>Apple server,
-    and deletes them&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;
+    &lt;p&gt;The</em></ins></span> Apple <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>Music client program</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its customers can
+  watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201602050"&gt;
-    &lt;p&gt;iOS version 9 for iThings</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-code signing&lt;/a&gt; that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
+    the <span class="removed"><del><strong>EU Copyright Directive make it &lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span> <span class="inserted"><ins><em>user's 
file system for music files, copies them</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
+      would require circumventing the iOS DRM.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>an Apple server,
+    and deletes them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a
+  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201602050"&gt;
+    &lt;p&gt;iOS version 9 for iThings &lt;a
+    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from</em></ins></span> the <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
+    Apple&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>uses DRM software to prevent 
people</strong></del></span> <span class="inserted"><ins><em>eventually backed 
off from this policy under
+    criticism</em></ins></span> from <span 
class="removed"><del><strong>charging an iThing with a 
+  generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
+  DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
+  focuses on</strong></del></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not 
acknowledged</em></ins></span> that <span class="removed"><del><strong>a new 
model</strong></del></span> <span class="inserted"><ins><em>this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510020"&gt;
-    &lt;p&gt;Apple forced millions of</em></ins></span> iThings <span 
class="removed"><del><strong>use</strong></del></span> to <span 
class="removed"><del><strong>lock up</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple forced millions</em></ins></span> of <span 
class="removed"><del><strong>Macbook introduced a requirement
+  for monitors</strong></del></span> <span 
class="inserted"><ins><em>iThings</em></ins></span> to <span 
class="removed"><del><strong>have malicious hardware,</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
-    a system upgrade without asking</em></ins></span> the <span 
class="removed"><del><strong>user.&lt;/p&gt;
-
-&lt;p&gt;Curiously,</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>is beginning to allow limited passage 
through</strong></del></span> <span class="inserted"><ins><em>did not
-    forcibly install</em></ins></span> the
-<span class="removed"><del><strong>walls</strong></del></span> <span 
class="inserted"><ins><em>upgrade but the downloading alone caused 
lots</em></ins></span>
-    of <span class="inserted"><ins><em>trouble.&lt;/p&gt;
+    a system upgrade without asking the users&lt;/a&gt;. Apple did not
+    forcibly install the upgrade</em></ins></span> but <span 
class="removed"><del><strong>DRM software in MacOS is
+  involved in activating</strong></del></span> the <span 
class="removed"><del><strong>hardware. The software for accessing iTunes
+  is also responsible.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>downloading alone caused lots
+    of trouble.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201412040"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201412040"&gt;
     &lt;p&gt;Apple &lt;a
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods</em></ins></span> the <span 
class="removed"><del><strong>iThing jail:</strong></del></span> <span 
class="inserted"><ins><em>music that</em></ins></span> users <span 
class="removed"><del><strong>can now install apps built</strong></del></span> 
<span class="inserted"><ins><em>had got</em></ins></span> from
-<span class="removed"><del><strong>source code, provided the source code is 
written in Swift.  Users
-cannot do</strong></del></span> <span class="inserted"><ins><em>internet music
-    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+    deleted from iPods the music</em></ins></span> that <span 
class="removed"><del><strong>caters to Bluray disks&lt;/a&gt;.  (The article 
focused on Windows
+  and said</strong></del></span> <span class="inserted"><ins><em>users had got 
from internet music
+    stores</em></ins></span> that <span class="removed"><del><strong>MacOS 
would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>competed with iTunes&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200709270"&gt;
@@ -874,19 +862,55 @@
     An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
     unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All</em></ins></span> this <span 
class="removed"><del><strong>freely because they are 
required</strong></del></span> <span class="inserted"><ins><em>was apparently 
intentional.&lt;/p&gt;
-  &lt;/li&gt;
+    censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="jails"&gt;Apple Jails&lt;/h3&gt;
+
+&lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
+iOS,</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
+    the <span class="removed"><del><strong>operating system 
of</strong></del></span> <span class="inserted"><ins><em>Great Nation&rdquo; 
app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to</em></ins></span> the <span class="removed"><del><strong>Apple 
iThings, is</strong></del></span> <span class="inserted"><ins><em>phone's 
microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>prototype
+of a jail&lt;/a&gt;.  It</strong></del></span> <span 
class="inserted"><ins><em>Android version</em></ins></span> was <span 
class="removed"><del><strong>Apple that introduced</strong></del></span> <span 
class="inserted"><ins><em>found to contain a
+    back-door allowing developers to run any code they wish 
in</em></ins></span> the <span class="removed"><del><strong>practice of
+designing general purpose computers with censorship of application
+programs.&lt;/p&gt;
+
+&lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app</em></ins></span> is <span class="removed"><del><strong>an article 
about the</strong></del></span> <span class="inserted"><ins><em>mandatory at 
some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+code signing&lt;/a&gt; that</strong></del></span>
+     <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>iThings use to lock up</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that</em></ins></span> the <span 
class="removed"><del><strong>user.&lt;/p&gt;
+
+&lt;p&gt;Curiously, Apple is beginning to allow limited passage 
through</strong></del></span> <span class="inserted"><ins><em>tests were only 
performed on</em></ins></span> the
+<span class="removed"><del><strong>walls</strong></del></span>
+    <span class="inserted"><ins><em>Android version</em></ins></span> of the 
<span class="removed"><del><strong>iThing jail: users can now 
install</strong></del></span> <span class="inserted"><ins><em>app, and that, 
according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>identify
-themselves. &lt;a 
href="https://developer.apple.com/xcode/"&gt;Here</strong></del></span>
-    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers 
that</em></ins></span> are <span 
class="removed"><del><strong>details&lt;/a&gt;. While this is a crack 
in</strong></del></span> <span class="inserted"><ins><em>busy at night &lt;a
-    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>built from
+source code, provided the source code is written in Swift.  Users
+cannot do this freely because they</strong></del></span> <span 
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span 
class="removed"><del><strong>required to identify
+themselves.</strong></del></span> <span class="inserted"><ins><em>busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://developer.apple.com/xcode/"&gt;Here
+are details&lt;/a&gt;. While this is a crack in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
@@ -1158,11 +1182,11 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="tyrants"&gt;Apple Tyrants&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+&lt;h3 <span class="removed"><del><strong>id="tyrants"&gt;Apple 
Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>id="tyrants"&gt;Tyrants&lt;/h3&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201412010"&gt;
     &lt;p&gt;Apple</em></ins></span> arbitrarily &lt;a <span 
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
   blocks</strong></del></span>
@@ -1254,7 +1278,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/16 07:30:04 $
+$Date: 2019/10/19 10:01:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- malware-apple.de.po 16 Oct 2019 07:30:04 -0000      1.144
+++ malware-apple.de.po 19 Oct 2019 10:01:30 -0000      1.145
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -182,7 +182,10 @@
 "vom Hersteller „autorisierte“ Betriebssystem zurückweisen."
 
 #. type: Content of: <h3>
-msgid "Apple Back Doors"
+# | [-Apple-]Back Doors
+#, fuzzy
+#| msgid "Apple Back Doors"
+msgid "Back Doors"
 msgstr "Hintertüren"
 
 #. type: Content of: <ul><li><p>
@@ -264,7 +267,10 @@
 "\" class=\"transnote\">[2]</a>"
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Zensur"
 
 #. type: Content of: <p>
@@ -286,8 +292,8 @@
 "Informationen siehe den Abschnitt <a href=\"#jails\">Gefängnisse</a>."
 
 #. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "DRM"
+msgid "DRM"
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -354,7 +360,10 @@
 "gekauften Mediendateien abspielt</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr "Inkompatibilität"
 
 #. type: Content of: <p>
@@ -428,7 +437,10 @@
 "Aufbewahrung von Dokumenten als ungeeignet</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Unsicherheit"
 
 #. type: Content of: <p>
@@ -531,7 +543,10 @@
 "der Mobilfunksoftware von Mobiltelefonen</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Interferenz"
 
 #. type: Content of: <p>
@@ -556,7 +571,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Gefängnisse"
 
 #. type: Content of: <p>
@@ -857,10 +875,10 @@
 "der App selbst zensiert</a> wurde."
 
 #. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
+# | [-Apple Deception-]{+Manipulation+}
 #, fuzzy
 #| msgid "Apple Deception"
-msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr "Täuschung"
 
 #. type: Content of: <ul><li><p>
@@ -890,7 +908,10 @@
 
 # Handlungszwang?
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Zwang"
 
 #. type: Content of: <p>
@@ -917,7 +938,10 @@
 "man nicht Abonnent des Musikstreaming-Dienstes Apple Music ist."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Sabotage"
 
 #. type: Content of: <p>
@@ -1190,11 +1214,39 @@
 "Applikationen. Scheinbar war das alles beabsichtigt."
 
 #. type: Content of: <h3>
-msgid "Apple Surveillance"
+# | [-Apple-]Surveillance
+#, fuzzy
+#| msgid "Apple Surveillance"
+msgid "Surveillance"
 msgstr "Überwachung"
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1679,7 +1731,10 @@
 "Apps gratis sind</a>)."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Tyrannen"
 
 #. type: Content of: <ul><li><p>
@@ -1829,6 +1884,9 @@
 msgid "Updated:"
 msgstr "Letzte Änderung:"
 
+#~ msgid "Apple DRM"
+#~ msgstr "DRM"
+
 #~ msgid ""
 #~ "Apple <a href=\"https://web.archive.org/web/20160608183145/http://www.";
 #~ "theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/\"> stops "

Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- malware-apple.es.po 16 Oct 2019 11:10:25 -0000      1.167
+++ malware-apple.es.po 19 Oct 2019 10:01:30 -0000      1.168
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -153,7 +154,7 @@
 "sistema operativo que no esté «autorizado» por el fabricante."
 
 #. type: Content of: <h3>
-msgid "Apple Back Doors"
+msgid "Back Doors"
 msgstr "Puertas traseras"
 
 #. type: Content of: <ul><li><p>
@@ -226,7 +227,10 @@
 "poder porque podemos confiar en Apple, sin lugar a dudas."
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Censura"
 
 #. type: Content of: <p>
@@ -240,8 +244,8 @@
 "<a href=\"#jails\">Prisiones de Apple</a>."
 
 #. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "Gestión digital de restricciones"
+msgid "DRM"
+msgstr "DRM"
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -310,7 +314,10 @@
 "vídeos que han adquirido</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr "Incompatibilidad"
 
 #. type: Content of: <p>
@@ -381,7 +388,10 @@
 "api=v2\">inapropiados para la conservación de documentos</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Falta de seguridad"
 
 #. type: Content of: <p>
@@ -468,7 +478,10 @@
 "\">multitud de agujeros en el software de radio de los teléfonos</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Interferencia de Apple"
 
 #. type: Content of: <p>
@@ -497,7 +510,10 @@
 "otras que no sean de Apple</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Prisiones"
 
 #. type: Content of: <p>
@@ -803,7 +819,10 @@
 "estaba censurando debido al asunto del que trataba</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Manipulation"
+# | [-Apple-]Manipulation
+#, fuzzy
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr "Manipulación"
 
 #. type: Content of: <ul><li><p>
@@ -828,7 +847,10 @@
 "opción», pero en realidad serán muy pocos los que puedan hacerlo."
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Presiones"
 
 #. type: Content of: <p>
@@ -853,7 +875,10 @@
 "Apple Music."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Sabotaje"
 
 #. type: Content of: <p>
@@ -1053,11 +1078,36 @@
 "aprueba. Al parecer, todo esto fue intencionado."
 
 #. type: Content of: <h3>
-msgid "Apple Surveillance"
+msgid "Surveillance"
 msgstr "Vigilancia"
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1401,7 +1451,10 @@
 "y recibir el código que Apple le envía."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Tiranos"
 
 #. type: Content of: <ul><li><p>
@@ -1499,6 +1552,9 @@
 msgid "Updated:"
 msgstr "Última actualización:"
 
+#~ msgid "Apple DRM"
+#~ msgstr "Gestión digital de restricciones"
+
 #~ msgid ""
 #~ "It cited a bizarre excuse, but the real reason is surely, &ldquo;China "
 #~ "ordered us to ban it.&rdquo;"

Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- malware-apple.fr.po 16 Oct 2019 10:47:18 -0000      1.174
+++ malware-apple.fr.po 19 Oct 2019 10:01:30 -0000      1.175
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2019-10-16 12:46+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -151,7 +152,7 @@
 "d'exploitation non « autorisé » par le fabricant."
 
 #. type: Content of: <h3>
-msgid "Apple Back Doors"
+msgid "Back Doors"
 msgstr "Portes dérobées"
 
 #. type: Content of: <ul><li><p>
@@ -226,7 +227,10 @@
 "possède ce pouvoir, car naturellement nous pouvons lui faire confiance."
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Censure"
 
 #. type: Content of: <p>
@@ -240,7 +244,7 @@
 "vous à la section <a href=\"#jails\">Prisons</a>."
 
 #. type: Content of: <h3>
-msgid "Apple DRM"
+msgid "DRM"
 msgstr "DRM"
 
 #. type: Content of: <ul><li><p>
@@ -310,7 +314,10 @@
 "vidéos qu'ils ont achetées</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr "Incompatibilité"
 
 #. type: Content of: <p>
@@ -380,7 +387,10 @@
 "api=v2\">impropres à la conservation des documents</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Insécurité"
 
 #. type: Content of: <p>
@@ -469,7 +479,10 @@
 "bogues dans le logiciel de radio des téléphones</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Ingérence"
 
 #. type: Content of: <p>
@@ -498,7 +511,10 @@
 "par des tiers</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Prisons"
 
 #. type: Content of: <p>
@@ -802,7 +818,10 @@
 "censurée à cause de son thème</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Manipulation"
+# | [-Apple-]Manipulation
+#, fuzzy
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr "Manipulation"
 
 #. type: Content of: <ul><li><p>
@@ -828,7 +847,10 @@
 "comprendront comment le faire."
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Pression sur le client"
 
 #. type: Content of: <p>
@@ -853,7 +875,10 @@
 "sur la popularité des chansons si vous n'êtes pas abonné à Apple Miusic."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Sabotage"
 
 #. type: Content of: <p>
@@ -1055,11 +1080,36 @@
 "html\">censure d'Apple</a>. Tout ceci était apparemment intentionnel."
 
 #. type: Content of: <h3>
-msgid "Apple Surveillance"
+msgid "Surveillance"
 msgstr "Surveillance"
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1405,7 +1455,10 @@
 "et recevoir le code de vérification envoyé dessus par Apple."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Tyrans"
 
 #. type: Content of: <ul><li><p>
@@ -1502,3 +1555,6 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid "Apple DRM"
+#~ msgstr "DRM"

Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-apple.it-diff.html  16 Oct 2019 07:30:04 -0000      1.57
+++ malware-apple.it-diff.html  19 Oct 2019 10:01:30 -0000      1.58
@@ -86,7 +86,7 @@
 &lt;/ul&gt;
 &lt;/div&gt;
 
-&lt;h3 id="back-doors"&gt;Apple Back Doors&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="back-doors"&gt;Apple 
Back</strong></del></span> <span 
class="inserted"><ins><em>id="back-doors"&gt;Back</em></ins></span> 
Doors&lt;/h3&gt;
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;&lt;p&gt;
 Mac</strong></del></span>
@@ -144,10 +144,10 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
+&lt;h3 <span class="removed"><del><strong>id="censorship"&gt;Apple 
Censorship&lt;/h3&gt;
+&lt;ul&gt;
 
-&lt;li&gt;</strong></del></span>
+&lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="censorship"&gt;Censorship&lt;/h3&gt;</em></ins></span>
 
 &lt;p&gt;Apple <span class="removed"><del><strong>&lt;a
 
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
@@ -163,7 +163,7 @@
 section for more information.&lt;/p&gt;
 
 
-&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
+&lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908150.1"&gt;
@@ -182,7 +182,8 @@
   &lt;li id="M201704070.1"&gt;
     &lt;p&gt;DRM makes</em></ins></span> the <span 
class="removed"><del><strong>LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;This is ironic because LinkedIn is a 
surveillance</strong></del></span> <span class="inserted"><ins><em>iPhone 7 
nearly &lt;a
+&lt;p&gt;This is ironic because LinkedIn is a surveillance system
+itself.</strong></del></span> <span class="inserted"><ins><em>iPhone 7 nearly 
&lt;a
     href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -217,7 +218,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
+&lt;h3 id="incompatibility"&gt;Incompatibility&lt;/h3&gt;
 
 &lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
 hinder users from switching to any alternative program&mdash;and, in
@@ -258,7 +259,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+&lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
   they do not count as malware. We mention them to refute the
@@ -307,7 +308,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;h3 id="interference"&gt;Interference&lt;/h3&gt;
 &lt;p&gt;Various proprietary programs often mess up the user's system. They
   are like sabotage, but they are not grave enough to qualify for the
   word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and
@@ -325,7 +326,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;h3 id="jails"&gt;Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
 iOS, the operating system of the Apple iThings, is the prototype
@@ -404,7 +405,7 @@
     
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
     by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is ironic because LinkedIn is a 
surveillance</em></ins></span> system itself.
+    &lt;p&gt;This is ironic because LinkedIn is a surveillance system 
itself.</em></ins></span>
     While subjecting its users to its own surveillance, it tries to
     protect its users from Russian surveillance, and is therefore subject
     to Russian censorship.&lt;/p&gt;
@@ -413,26 +414,36 @@
     apps.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+Apple</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201701050"&gt;
-    &lt;p&gt;Apple used its censorship system to enforce China's censorship 
&lt;a
-    
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
-    by blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple</em></ins></span> used its censorship system to enforce 
China's censorship &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
+    by</em></ins></span> blocking distribution of the New York Times <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605190"&gt;
-    &lt;p&gt;Apple censors games, &lt;a
-    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
-    banning some games from the cr&hellip;app store&lt;/a&gt; because of which
+    &lt;p&gt;Apple</em></ins></span> censors games, &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+    banning</em></ins></span> some games from the cr&hellip;app 
store&lt;/a&gt; because of which
     political points they suggest. Some political points are apparently
     considered acceptable.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201509290"&gt;
-    &lt;p&gt;Apple &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+Apple</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509290"&gt;
+    &lt;p&gt;Apple</em></ins></span> &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
     banned a program from the App Store&lt;/a&gt; because its developers
-    committed the enormity of disassembling some iThings.&lt;/p&gt;
+    committed the enormity of disassembling some <span 
class="removed"><del><strong>iThings.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iThings.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509230"&gt;
@@ -458,7 +469,7 @@
     not be allowed to censor apps.  Even if Apple carried out this act of
     censorship with some care, it would still be wrong.  Whether racism
     is bad, whether educating people about drone attacks is bad, are not
-    the real issue.</em></ins></span>  Apple <span 
class="inserted"><ins><em>should not have the power to impose its views
+    the real issue.  Apple should not have the power to impose its views
     about either of these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -469,28 +480,11 @@
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple</em></ins></span> used <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> censorship <span 
class="removed"><del><strong>system</strong></del></span> <span 
class="inserted"><ins><em>power in 2014</em></ins></span> to <span 
class="removed"><del><strong>enforce
-China's censorship &lt;a 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by
-blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple censors
-games,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
-some games from</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>cr&hellip;app store&lt;/a&gt; because of which 
political
-points they suggest. Some political points are apparently considered
-acceptable.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple</strong></del></span> <span class="inserted"><ins><em>iThings for a 
time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;</em></ins></span>
-    banned a <span class="removed"><del><strong>program from the App 
Store&lt;/a&gt; because its developers
-committed the enormity of disassembling some iThings.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>game 
about growing marijuana&lt;/a&gt;, while permitting games
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
+    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps</em></ins></span> 
Apple <span class="inserted"><ins><em>considers
     killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
@@ -505,103 +499,66 @@
 &lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
-As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
-rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;
-This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-affects other Apple services&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
-
-&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
-  they do not count as malware. We mention them to refute the
-  supposition that prestigious proprietary software doesn't have grave
-  bugs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
-    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application which uses this API to render
-    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A bug in the iThings Messages
-      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-        a malicious web site to extract all the user's messaging 
history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+As of 2015, Apple</strong></del></span> <span 
class="inserted"><ins><em>matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Apple Manipulation&lt;/h3&gt;
+&lt;h3 id="manipulation"&gt;Manipulation&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo;</em></ins></span> are <span 
class="removed"><del><strong>not grave enough</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed</em></ins></span> to <span 
class="removed"><del><strong>qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
-interference.&lt;/p&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
+rights</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed to mislead users,</em></ins></span> or <span 
class="removed"><del><strong>would help women find 
abortions&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings</strong></del></span> 
<span class="inserted"><ins><em>mislead users, or make option settings 
hard</em></ins></span>
-    to <span class="removed"><del><strong>download a system upgrade
-         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>make option 
settings hard
+    to find&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This allows a company such as</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install the upgrade but the 
downloading alone caused lots of trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to say, &ldquo;We allow users
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
     to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+    to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
-
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+&lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.</em></ins></span>  This 
<span class="removed"><del><strong>particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects</strong></del></span> <span class="inserted"><ins><em>section reports 
examples of hard sell and</em></ins></span> other <span 
class="inserted"><ins><em>unjust commercial tactics by Apple.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
-    &lt;p&gt;Apple</em></ins></span> Siri &lt;a
+    &lt;p&gt;Apple Siri &lt;a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
-    to give you information&lt;/a&gt; about music charts if you're not an Apple
-    Music subscriber.&lt;/p&gt;
-  &lt;/li&gt;
+    to give you information&lt;/a&gt; about music charts if you're not 
an</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;</strong></del></span>
+    <span class="inserted"><ins><em>Music subscriber.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="sabotage"&gt;Sabotage&lt;/h3&gt;</em></ins></span>
 
-<span class="removed"><del><strong>&lt;p&gt;The wrongs in this 
section</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;These</em></ins></span> are <span 
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way that hurts the user.
-But they are a lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> Apple
-<span class="removed"><del><strong>actions</strong></del></span> <span 
class="inserted"><ins><em>employs its power over users
-to directly intervene in ways</em></ins></span> that harm <span 
class="inserted"><ins><em>them or block their work.&lt;/p&gt;
+&lt;p&gt;These <span class="removed"><del><strong>bugs are/were not 
intentional, so unlike the rest</strong></del></span> <span 
class="inserted"><ins><em>are situations in which Apple employs its power over 
users
+to directly intervene in ways that harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When Apple suspects a user of fraud, it
-    judges the case secretly and presents the verdict
-    as a fait accompli.  The punishment</em></ins></span> to <span 
class="inserted"><ins><em>a user found guilty &lt;a
+    &lt;p&gt;When Apple suspects a user</em></ins></span> of <span 
class="inserted"><ins><em>fraud, it
+    judges</em></ins></span> the <span class="removed"><del><strong>file
+  they</strong></del></span> <span class="inserted"><ins><em>case secretly and 
presents the verdict
+    as a fait accompli.  The punishment to a user found guilty &lt;a
     
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
-    being cut off for life, which more-or-less cripples</em></ins></span> the 
<span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>user's Apple
+    being cut off for life, which more-or-less cripples the user's Apple
     devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
-    the performance</em></ins></span> of <span 
class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>older phones to force users to buy their newer
+    the performance of older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -610,16 +567,13 @@
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
     Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple <span class="inserted"><ins><em>to block
+    &lt;p&gt;This evidently has to</em></ins></span> do <span 
class="inserted"><ins><em>with Russia's command to Apple to block
     Telegram in Russia.&lt;/p&gt;
 
-    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+    &lt;p&gt;The Telegram client is free software on other platforms, 
but</em></ins></span> not <span class="removed"><del><strong>count as malware. 
We mention them</strong></del></span> <span class="inserted"><ins><em>on
     iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
-    are jails&lt;/a&gt;, they don't permit any app to be 
free</em></ins></span> software.&lt;/p&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;/li&gt;
+    are jails&lt;/a&gt;, they don't permit any app</em></ins></span> to <span 
class="removed"><del><strong>refute</strong></del></span> <span 
class="inserted"><ins><em>be free software.&lt;/p&gt;
+  &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
     &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
@@ -628,35 +582,46 @@
     accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201706060"&gt;</em></ins></span>
+  &lt;li id="M201706060"&gt;
     &lt;p&gt;Apple will stop &lt;a
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's the nature of proprietary software.&lt;/p&gt;
-  &lt;/li&gt;
+    that's</em></ins></span> the
+  <span class="removed"><del><strong>supposition that 
prestigious</strong></del></span> <span class="inserted"><ins><em>nature 
of</em></ins></span> proprietary <span class="removed"><del><strong>software 
doesn't have grave
+  bugs.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;The</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an 
attacker</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201704070"&gt;
-    &lt;p id="iphone7-sabotage"&gt;The</em></ins></span>
-    iPhone 7 contains DRM specifically designed to &lt;a
-  <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;</em></ins></span>
+  &lt;li id="M201704070"&gt;
+    &lt;p id="iphone7-sabotage"&gt;The
+    iPhone 7 contains DRM specifically designed</em></ins></span> to &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer to use the term &lt;a
-  <span 
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"&gt;</em></ins></span>
 digital
-    handcuffs&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article</em></ins></span> uses <span 
class="removed"><del><strong>this API</strong></del></span> <span 
class="inserted"><ins><em>the term &ldquo;lock&rdquo;</em></ins></span>
+    to <span class="removed"><del><strong>render
+    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li&gt;
+    &lt;p&gt;A bug in</strong></del></span> <span 
class="inserted"><ins><em>describe</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+        a malicious web site</strong></del></span> <span 
class="inserted"><ins><em>DRM, but we prefer</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>term &lt;a
+    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
+    handcuffs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
@@ -665,112 +630,182 @@
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201605040"&gt;</em></ins></span>
-    &lt;p&gt;The Apple Music client program &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
-    the user's file system for music files, copies them to an Apple server,
+  &lt;li id="M201605040"&gt;
+    &lt;p&gt;The Apple Music client program &lt;a
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
+    the user's <span class="removed"><del><strong>system. They are like 
sabotage, but they are not grave enough</strong></del></span> <span 
class="inserted"><ins><em>file system for music files, copies 
them</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>an Apple server,
     and deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Apple &lt;a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-stops users from fixing the security bugs in Quicktime for
-      Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201602050"&gt;</em></ins></span>
-    &lt;p&gt;iOS version 9 for iThings &lt;a
+  &lt;li id="M201602050"&gt;
+    &lt;p&gt;iOS version 9</em></ins></span> for <span 
class="removed"><del><strong>the word &ldquo;sabotage&rdquo;. 
Nonetheless,</strong></del></span> <span class="inserted"><ins><em>iThings &lt;a
     
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
-    them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from the <span class="removed"><del><strong>users. However, it 
has not acknowledged</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
+    them irreparably if</em></ins></span> they <span 
class="removed"><del><strong>are nasty and wrong. This section describes 
examples of</strong></del></span> <span class="inserted"><ins><em>were repaired 
by someone other than
+    Apple&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510020"&gt;
-    &lt;p&gt;Apple forced millions of iThings to &lt;a
-    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
-    a system upgrade without asking the users&lt;/a&gt;. Apple did not
-    forcibly install the upgrade but the downloading alone caused lots
+    &lt;p&gt;Apple</em></ins></span> forced millions of iThings to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download</em></ins></span>
+    a system upgrade
+         <span class="removed"><del><strong>&lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without</strong></del></span>
 <span class="inserted"><ins><em>without</em></ins></span> asking the 
users&lt;/a&gt;. Apple did not
+    forcibly install the upgrade but the <span 
class="removed"><del><strong>downloading alone caused lots of trouble.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple Siri</strong></del></span> <span 
class="inserted"><ins><em>downloading alone caused lots
     of trouble.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412040"&gt;
-    &lt;p&gt;Apple &lt;a
-    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods the music</em></ins></span> that
-    <span class="removed"><del><strong>this was 
wrong.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
had got from internet music
-    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
+      about</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+    deleted from iPods the</em></ins></span> music <span 
class="removed"><del><strong>charts if you're not an</strong></del></span> 
<span class="inserted"><ins><em>that users had got from internet music
+    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200709270"&gt;
+  &lt;li id="M200709270"&gt;
     &lt;p&gt;&lt;a
-    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</em></ins></span>
-    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
-  <span class="removed"><del><strong>unlocked.&lt;/a&gt;</strong></del></span>
-    <span class="inserted"><ins><em>unlocked&lt;/a&gt;.</em></ins></span>  The 
&ldquo;upgrade&rdquo; also deactivated applications
+    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+    An</em></ins></span> Apple <span class="removed"><del><strong>Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>firmware &ldquo;upgrade&rdquo; bricked iPhones that 
had been
+    unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple
-  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted from iPods the music that users had got from internet music
-  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+&lt;h3 <span class="removed"><del><strong>id="sabotage"&gt;Apple 
Sabotage&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
-    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>wrongs</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="inserted"><ins><em>the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
+not involve making</strong></del></span>
+    <span class="inserted"><ins><em>app is mandatory at some 
workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>program that runs</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way that hurts the user.
+But they are</strong></del></span> <span class="inserted"><ins><em>text 
editor) includes</em></ins></span> a <span class="removed"><del><strong>lot 
like malware, since they are technical Apple
+actions</strong></del></span>
+    <span class="inserted"><ins><em>clarification saying</em></ins></span> 
that <span class="removed"><del><strong>harm to</strong></del></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the
+    Android version</em></ins></span> of <span 
class="removed"><del><strong>specific Apple software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Apple will stop &lt;a 
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
+    model iThings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
+    that's</strong></del></span> the <span 
class="removed"><del><strong>nature</strong></del></span> <span 
class="inserted"><ins><em>app, and that, according to Apple, &ldquo;this
+    kind</em></ins></span> of <span class="removed"><del><strong>proprietary 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lsquo;superuser&rsquo; surveillance could not be 
conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+  <span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;The iPhone 7 contains DRM specifically 
designed</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to
+    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that 
are busy at night</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+  brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
+  &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    sending users' personal information to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The article <span class="removed"><del><strong>uses the term 
&ldquo;lock&rdquo; to describe</strong></del></span> <span 
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    Channel (owned by IBM),</em></ins></span> the <span 
class="removed"><del><strong>DRM,
+  but we prefer to use</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
     and DoorDash. But it is likely that most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
+    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>term &lt;a
+  href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;
+  digital handcuffs&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>case of DoorDash). Once this information
     is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201809070"&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
-    
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
-    the user's browsing history&lt;/a&gt;.&lt;/p&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Apple Music client
+      program</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201809070"&gt;
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports</em></ins></span>
+    the user's <span class="removed"><del><strong>file system for music files, 
copies them to an Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>browsing 
history&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+stops users from fixing</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>security bugs in Quicktime for
+      Windows&lt;/a&gt;, while refusing</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    illegal</em></ins></span> to <span class="removed"><del><strong>fix them 
itself.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>study 
how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;iOS version 9 for</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In the latest</em></ins></span> iThings <span 
class="inserted"><ins><em>system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn</em></ins></span> them <span 
class="removed"><del><strong>irreparably if they were repaired by someone other 
than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that
+    this was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+  An</strong></del></span> <span class="inserted"><ins><em>off&lt;/a&gt;.  A 
more advanced way really does turn
+    them off&mdash;only until 5am.  That's</em></ins></span> Apple <span 
class="removed"><del><strong>firmware &ldquo;upgrade&rdquo; bricked iPhones 
that had been
+  unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated applications
+  not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+  censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple
+  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods the music that users had got from internet music
+  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
-  &lt;li id="M201702150"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
     &lt;p&gt;Apple</em></ins></span> proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch <span 
class="removed"><del><strong>screen&lt;/a&gt;
@@ -856,11 +891,11 @@
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations 
in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410300"&gt;
-    &lt;p&gt; MacOS automatically</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+    &lt;p&gt; MacOS automatically &lt;a
+    
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
     sends to Apple servers unsaved documents being edited&lt;/a&gt;. The
-    things you have not decided to save are &lt;a
-    
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
+    things you have not decided to save are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
     even more sensitive&lt;/a&gt; than</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send reports to Apple&lt;/a&gt; 
servers.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1023,11 +1058,11 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="tyrants"&gt;Apple Tyrants&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+&lt;h3 <span class="removed"><del><strong>id="tyrants"&gt;Apple 
Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>id="tyrants"&gt;Tyrants&lt;/h3&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201412010"&gt;
     &lt;p&gt;Apple</em></ins></span> arbitrarily &lt;a <span 
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
   blocks</strong></del></span>
@@ -1119,7 +1154,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/16 07:30:04 $
+$Date: 2019/10/19 10:01:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- malware-apple.it.po 16 Oct 2019 07:30:04 -0000      1.138
+++ malware-apple.it.po 19 Oct 2019 10:01:30 -0000      1.139
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -173,7 +173,10 @@
 "di sistemi operativi non “autorizzati” dal produttore."
 
 #. type: Content of: <h3>
-msgid "Apple Back Doors"
+# | [-Apple-]Back Doors
+#, fuzzy
+#| msgid "Apple Back Doors"
+msgid "Back Doors"
 msgstr "Backdoor di Apple"
 
 #. type: Content of: <ul><li><p>
@@ -262,7 +265,10 @@
 "potere perché di Apple ci si può fidare, eccome."
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Censura di Apple"
 
 #. type: Content of: <p>
@@ -273,8 +279,8 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "DRM di Apple"
+msgid "DRM"
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -343,10 +349,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-# | Apple [-Insecurity-] {+Incompatibility+}
+# | [-Apple Insecurity-]{+Incompatibility+}
 #, fuzzy
 #| msgid "Apple Insecurity"
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr "Mancata sicurezza di Apple"
 
 #. type: Content of: <p>
@@ -393,7 +399,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Mancata sicurezza di Apple"
 
 #. type: Content of: <p>
@@ -500,7 +509,10 @@
 "programmi di radiocomunicazione dei telefoni</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Interferenza di Apple"
 
 #. type: Content of: <p>
@@ -524,7 +536,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Prigioni di Apple"
 
 #. type: Content of: <p>
@@ -918,10 +933,10 @@
 "drone-strikes/\">solo per il tema di cui trattava</a>."
 
 #. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
+# | [-Apple Deception-]{+Manipulation+}
 #, fuzzy
 #| msgid "Apple Deception"
-msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr "Inganni di Apple"
 
 #. type: Content of: <ul><li><p>
@@ -947,7 +962,10 @@
 "come farlo."
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Pressioni di Apple"
 
 #. type: Content of: <p>
@@ -972,7 +990,10 @@
 "classifiche musicali se non siete iscritti ad Apple Music."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Sabotaggio di Apple"
 
 #. type: Content of: <p>
@@ -1217,11 +1238,39 @@
 "Tutto questo era apparentemente intenzionale."
 
 #. type: Content of: <h3>
-msgid "Apple Surveillance"
+# | [-Apple-]Surveillance
+#, fuzzy
+#| msgid "Apple Surveillance"
+msgid "Surveillance"
 msgstr "Sorveglianza di Apple"
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1646,7 +1695,10 @@
 "che Apple invia a tale indirizzo."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Tiranni di Apple"
 
 #. type: Content of: <ul><li><p>
@@ -1781,6 +1833,9 @@
 msgid "Updated:"
 msgstr "Ultimo aggiornamento:"
 
+#~ msgid "Apple DRM"
+#~ msgstr "DRM di Apple"
+
 #~ msgid ""
 #~ "<a href=\"http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-";
 #~ "think-yo.html\"> iOS, the operating system of the Apple iThings, is a "

Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-apple.ja-diff.html  16 Oct 2019 07:30:04 -0000      1.70
+++ malware-apple.ja-diff.html  19 Oct 2019 10:01:30 -0000      1.71
@@ -96,7 +96,7 @@
 &lt;/div&gt;
 <span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
 
-&lt;h3 id="back-doors"&gt;Apple Back Doors&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="back-doors"&gt;Apple 
Back</strong></del></span> <span 
class="inserted"><ins><em>id="back-doors"&gt;Back</em></ins></span> 
Doors&lt;/h3&gt;
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;&lt;p&gt;
 Mac</strong></del></span>
@@ -154,45 +154,57 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
+&lt;h3 <span class="removed"><del><strong>id="censorship"&gt;Apple 
Censorship&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+Apple censors
+games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from the cr&hellip;app store&lt;/a&gt; because 
of</strong></del></span> <span 
class="inserted"><ins><em>id="censorship"&gt;Censorship&lt;/h3&gt;
+
+&lt;p&gt;Apple mainly uses iOS,</em></ins></span> which <span 
class="removed"><del><strong>political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+banned</strong></del></span> <span 
class="inserted"><ins><em>is</em></ins></span> a <span 
class="removed"><del><strong>program from the App Store&lt;/a&gt; because its 
developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;Apple mainly uses iOS, which is a 
typical jail, to impose censorship
-through the</em></ins></span> Apple <span class="removed"><del><strong>censors
-games,</strong></del></span> <span class="inserted"><ins><em>Store. Please 
refer to the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
-some games from</strong></del></span> <span 
class="inserted"><ins><em>href="#jails"&gt;Apple Jails&lt;/a&gt;
+&lt;li&gt;&lt;p&gt;
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time</strong></del></span> <span 
class="inserted"><ins><em>typical jail, to impose censorship
+through</em></ins></span> the <span class="removed"><del><strong>developers
+fixed one &ldquo;problem&rdquo;,</strong></del></span> Apple <span 
class="removed"><del><strong>complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>Store. Please 
refer to</em></ins></span> the <span class="removed"><del><strong>fifth 
rejection,
+Apple</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the app based</strong></del></span> <span 
class="inserted"><ins><em>href="#jails"&gt;Apple Jails&lt;/a&gt;
 section for more information.&lt;/p&gt;
 
 
-&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
+&lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908150.1"&gt;
-    &lt;p&gt;Apple is putting DRM on iPhone batteries, and</em></ins></span> 
the <span class="removed"><del><strong>cr&hellip;app store&lt;/a&gt; because of 
which political
-points they suggest. Some political points</strong></del></span> <span 
class="inserted"><ins><em>system proprietary
-    software &lt;a href="#M201908150"&gt;turns off certain features when 
batteries</em></ins></span>
-    are <span class="removed"><del><strong>apparently considered
-acceptable.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>replaced other than by 
Apple.&lt;/a&gt;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
-banned a program from the App Store&lt;/a&gt; because its developers
-committed</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704070.1"&gt;
-    &lt;p&gt;DRM makes</em></ins></span> the <span 
class="removed"><del><strong>enormity of disassembling some iThings.
+    &lt;p&gt;Apple is putting DRM</em></ins></span> on <span 
class="inserted"><ins><em>iPhone batteries, and</em></ins></span> the <span 
class="removed"><del><strong>subject matter&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iPhone 7 nearly &lt;a
+&lt;li&gt;&lt;p&gt;
+As</strong></del></span> <span class="inserted"><ins><em>system proprietary
+    software &lt;a href="#M201908150"&gt;turns off certain features when 
batteries
+    are replaced other than by Apple.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704070.1"&gt;
+    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
     href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</em></ins></span>
-    Apple <span class="removed"><del><strong>rejected</strong></del></span> 
<span class="inserted"><ins><em>uses DRM software to prevent people from 
charging</em></ins></span> an <span class="removed"><del><strong>app that 
displayed the locations of</strong></del></span> <span 
class="inserted"><ins><em>iThing
+    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
+    Apple uses DRM software to prevent people from charging an iThing
     with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -220,7 +232,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
+&lt;h3 id="incompatibility"&gt;Incompatibility&lt;/h3&gt;
 
 &lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
 hinder users from switching to any alternative program&mdash;and, in
@@ -261,7 +273,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+&lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
   they do not count as malware. We mention them to refute the
@@ -310,7 +322,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;h3 id="interference"&gt;Interference&lt;/h3&gt;
 &lt;p&gt;Various proprietary programs often mess up the user's system. They
   are like sabotage, but they are not grave enough to qualify for the
   word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and
@@ -328,7 +340,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;h3 id="jails"&gt;Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
 iOS, the operating system of the Apple iThings, is the prototype
@@ -437,14 +449,18 @@
   &lt;/li&gt;
 
   &lt;li id="M201509230"&gt;
-    &lt;p&gt;As of 2015, Apple &lt;a
-    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
-    systematically bans apps that endorse abortion rights or would help
+    &lt;p&gt;As</em></ins></span> of 2015, Apple &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+    systematically</em></ins></span> bans apps that endorse abortion rights or 
would help
     women find abortions&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This particular political slant &lt;a
+<span class="removed"><del><strong>&lt;p&gt;
+This</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;This</em></ins></span> particular 
political slant &lt;a
     
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
+    affects other Apple <span class="removed"><del><strong>services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506250"&gt;
@@ -481,233 +497,218 @@
 
   &lt;li id="M201402070"&gt;
     &lt;p&gt;Apple rejected an app that displayed the locations
-    of</em></ins></span> US drone assassinations, giving various excuses. Each
+    of US drone assassinations, giving various excuses. Each
     time the developers fixed one &ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection, Apple &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted</em></ins></span> it was censoring the app based on the subject 
<span class="removed"><del><strong>matter&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
-rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;
-This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-affects other Apple services&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
-    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application which uses this API to render
-    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A bug in the iThings Messages
-      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-        a malicious web site to extract all the user's messaging 
history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    complained about another.  After the fifth rejection, Apple &lt;a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Apple Manipulation&lt;/h3&gt;
+&lt;h3 id="manipulation"&gt;Manipulation&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo;</em></ins></span> are <span 
class="removed"><del><strong>not grave enough</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed</em></ins></span> to <span 
class="removed"><del><strong>qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings</strong></del></span> 
<span class="inserted"><ins><em>mislead users, or make option settings 
hard</em></ins></span>
-    to <span class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
+    interfaces designed to mislead users, or make option settings hard
+    to find&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This allows</em></ins></span> a <span 
class="removed"><del><strong>system upgrade
-         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>company such as</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install the upgrade but the 
downloading alone caused lots of trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to say, &ldquo;We allow users
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
     to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+    to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+&lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;
 
 &lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
-    &lt;p&gt;Apple</em></ins></span> Siri &lt;a
+    &lt;p&gt;Apple Siri &lt;a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
     to give you information&lt;/a&gt; about music charts if you're not an Apple
     Music subscriber.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;The wrongs</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;A vulnerability</strong></del></span> <span 
class="inserted"><ins><em>id="sabotage"&gt;Sabotage&lt;/h3&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;These are situations in which Apple 
employs its power over users
-to directly intervene</em></ins></span> in <span 
class="removed"><del><strong>this section are not precisely malware, since they 
do
-not involve making the program</strong></del></span> <span 
class="inserted"><ins><em>ways</em></ins></span> that <span 
class="removed"><del><strong>runs in</strong></del></span> <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
+&lt;p&gt;These are situations</em></ins></span> in <span 
class="removed"><del><strong>Apple's Image I/O API allowed an attacker
+    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application</strong></del></span> which <span 
class="removed"><del><strong>uses this API</strong></del></span> <span 
class="inserted"><ins><em>Apple employs its power over users</em></ins></span>
+to <span class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>directly intervene in ways that harm them or block 
their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When Apple suspects</em></ins></span> a <span 
class="removed"><del><strong>way that hurts</strong></del></span> <span 
class="inserted"><ins><em>user of fraud, it
-    judges</em></ins></span> the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>case 
secretly and presents the verdict
-    as</em></ins></span> a <span class="removed"><del><strong>lot like 
malware, since they are technical Apple
-actions that harm</strong></del></span> <span class="inserted"><ins><em>fait 
accompli.  The punishment</em></ins></span> to <span 
class="inserted"><ins><em>a user found guilty &lt;a
+    &lt;p&gt;When Apple suspects</em></ins></span> a <span 
class="removed"><del><strong>certain kind</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> of <span 
class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>fraud, it
+    judges the case secretly and presents the verdict
+    as a fait accompli.  The punishment to a user found guilty &lt;a
     
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
-    being cut off for life, which more-or-less cripples</em></ins></span> the 
<span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>user's Apple
-    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
+    being cut off for life, which more-or-less cripples the user's Apple
+    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810240"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug in</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
-    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
-    the performance</em></ins></span> of <span 
class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>older phones to force users to buy their newer
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
+    the <span class="removed"><del><strong>iThings Messages
+      app</strong></del></span> <span class="inserted"><ins><em>performance of 
older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805310"&gt;
-    &lt;p&gt;Apple has &lt;a
-    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple <span 
class="removed"><del><strong>software.&lt;/p&gt;
+    &lt;p&gt;Apple has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>malicious web site</strong></del></span> <span 
class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>to block
-    Telegram in Russia.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This evidently has</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>do with Russia's command to Apple to block
+    Telegram in Russia.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>Apple 
Music</strong></del></span> <span 
class="inserted"><ins><em>Telegram</em></ins></span> client
-      <span class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>is free software on other platforms, but not on
-    iThings. Since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
+    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
     are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
     &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
     
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes</em></ins></span> the <span 
class="removed"><del><strong>user's</strong></del></span> file system <span 
class="inserted"><ins><em>from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+    changes</em></ins></span> the <span class="removed"><del><strong>user's 
messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>file 
system from HFS+  to APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of 
MacOS.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201706060"&gt;
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201706060"&gt;
     &lt;p&gt;Apple will stop &lt;a
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
-    bugs</em></ins></span> for <span class="removed"><del><strong>music files, 
copies them</strong></del></span> <span class="inserted"><ins><em>older model 
iThings&lt;/a&gt;.&lt;/p&gt;
+    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's the nature of proprietary software.&lt;/p&gt;
+    that's the nature of</em></ins></span> proprietary <span 
class="removed"><del><strong>programs often mess up</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains DRM specifically designed</em></ins></span> to <span 
class="inserted"><ins><em>&lt;a
+    iPhone 7 contains DRM specifically designed to &lt;a
     
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
-    brick it if</em></ins></span> an <span class="removed"><del><strong>Apple
-      server, and deletes them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;unauthorized&rdquo; repair shop fixes 
it&lt;/a&gt;.
+    brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer to use the term &lt;a
+    &lt;p&gt;The article uses</em></ins></span> the <span 
class="removed"><del><strong>user's system. They are like 
sabotage,</strong></del></span> <span class="inserted"><ins><em>term 
&ldquo;lock&rdquo;
+    to describe the DRM,</em></ins></span> but <span 
class="removed"><del><strong>they are not grave enough</strong></del></span> 
<span class="inserted"><ins><em>we prefer</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>use the term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
-    handcuffs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;</em></ins></span>
+  &lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</em></ins></span>
-    stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
+    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+    stops users from fixing the security bugs in Quicktime</em></ins></span> 
for <span class="inserted"><ins><em>Windows&lt;/a&gt;,
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;
+  &lt;li id="M201605040"&gt;
     &lt;p&gt;The Apple Music client program &lt;a
-    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
-    the user's file system for music files, copies them to an Apple server,
-    and deletes them&lt;/a&gt;.&lt;/p&gt;
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
+    the <span class="removed"><del><strong>word &ldquo;sabotage&rdquo;. 
Nonetheless, they are nasty</strong></del></span> <span 
class="inserted"><ins><em>user's file system for music files, copies them to an 
Apple server,</em></ins></span>
+    and <span class="removed"><del><strong>wrong. This section describes 
examples of</strong></del></span> <span class="inserted"><ins><em>deletes 
them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201602050"&gt;</em></ins></span>
-    &lt;p&gt;iOS version 9 for iThings &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+  &lt;li id="M201602050"&gt;
+    &lt;p&gt;iOS version 9 for iThings &lt;a
+    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
-    them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    Apple&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>eventually backed off from this policy under
     criticism from the users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510020"&gt;
-    &lt;p&gt;Apple forced millions of iThings to &lt;a
-    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
-    a system upgrade without asking the users&lt;/a&gt;. Apple did not
+    &lt;p&gt;Apple</em></ins></span> forced millions of iThings to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download</em></ins></span>
+    a system upgrade
+         <span class="removed"><del><strong>&lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without</strong></del></span>
 <span class="inserted"><ins><em>without</em></ins></span> asking the 
users&lt;/a&gt;. Apple did not
     forcibly install the upgrade but the downloading alone caused lots
     of trouble.&lt;/p&gt;
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201412040"&gt;
-    &lt;p&gt;Apple &lt;a
-    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted</em></ins></span> from <span 
class="inserted"><ins><em>iPods</em></ins></span> the <span 
class="removed"><del><strong>users. However, it has not 
acknowledged</strong></del></span> <span 
class="inserted"><ins><em>music</em></ins></span> that
-    <span class="removed"><del><strong>this was 
wrong.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
had got from internet music
-    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</strong></del></span>
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple Siri</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M200709270"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201412040"&gt;
+    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
+      about</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+    deleted from iPods the</em></ins></span> music <span 
class="removed"><del><strong>charts if you're not an</strong></del></span> 
<span class="inserted"><ins><em>that users had got from internet music
+    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200709270"&gt;
     &lt;p&gt;&lt;a
-    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</em></ins></span>
-    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
-  <span class="removed"><del><strong>unlocked.&lt;/a&gt;</strong></del></span>
-    <span class="inserted"><ins><em>unlocked&lt;/a&gt;.</em></ins></span>  The 
&ldquo;upgrade&rdquo; also deactivated applications
+    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+    An</em></ins></span> Apple <span class="removed"><del><strong>Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>firmware &ldquo;upgrade&rdquo; bricked iPhones that 
had been
+    unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple
-  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted from iPods the music that users had got from internet music
-  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
+&lt;h3 <span class="removed"><del><strong>id="sabotage"&gt;Apple 
Sabotage&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>wrongs</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="inserted"><ins><em>the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
+not involve making</strong></del></span>
+    <span class="inserted"><ins><em>app is mandatory at some 
workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>program that runs</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a
+    clarification saying</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> the <span 
class="removed"><del><strong>user.
+But they are a lot like malware, since they are technical Apple
+actions</strong></del></span> <span class="inserted"><ins><em>tests were only 
performed on the
+    Android version of the app, and that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>harm</strong></del></span> <span 
class="inserted"><ins><em>are busy at night &lt;a
     
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+    sending users' personal information</em></ins></span> to <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
@@ -715,44 +716,78 @@
     and DoorDash. But it is likely that most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
+    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>case</em></ins></span> of <span 
class="removed"><del><strong>specific Apple software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Apple Music client
+      program</strong></del></span> <span class="inserted"><ins><em>DoorDash). 
Once this information
     is collected by the company, there is no telling what it will be
     used for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201809070"&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
-    the user's browsing history&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports</em></ins></span>
+    the user's <span class="removed"><del><strong>file system for music files, 
copies them to an Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>browsing 
history&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+stops users from fixing</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>security bugs in Quicktime for
+      Windows&lt;/a&gt;, while refusing</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    illegal</em></ins></span> to <span class="removed"><del><strong>fix them 
itself.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>study 
how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201702150"&gt;
-    &lt;p&gt;Apple proposes &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;iOS version 9 for</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In the latest</em></ins></span> iThings <span 
class="inserted"><ins><em>system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn</em></ins></span> them <span 
class="removed"><del><strong>irreparably if they were repaired by someone other 
than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that
+    this was wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+  An</strong></del></span> <span class="inserted"><ins><em>off&lt;/a&gt;.  A 
more advanced way really does turn
+    them off&mdash;only until 5am.  That's</em></ins></span> Apple <span 
class="removed"><del><strong>firmware &ldquo;upgrade&rdquo; bricked iPhones 
that had been
+  unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated applications
+  not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+  censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
+    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>music that users had got from internet music
+  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone is snooping on 
them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
-  &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201611170"&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -793,7 +828,7 @@
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any <span 
class="removed"><del><strong>of them through
+    security to get at them, but <span class="removed"><del><strong>NSA can 
access any of them through
       &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
@@ -802,7 +837,7 @@
   edited&lt;/a&gt;. The &lt;a
   
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
   things you have not decided to save are even more sensitive than the
-  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>of them through &lt;a
+  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>NSA can access any of them through &lt;a
     
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -987,11 +1022,11 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="tyrants"&gt;Apple Tyrants&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+&lt;h3 <span class="removed"><del><strong>id="tyrants"&gt;Apple 
Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>id="tyrants"&gt;Tyrants&lt;/h3&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201412010"&gt;
     &lt;p&gt;Apple</em></ins></span> arbitrarily &lt;a <span 
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
   blocks</strong></del></span>
@@ -1083,7 +1118,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/16 07:30:04 $
+$Date: 2019/10/19 10:01:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- malware-apple.ja.po 16 Oct 2019 07:30:04 -0000      1.121
+++ malware-apple.ja.po 19 Oct 2019 10:01:31 -0000      1.122
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -152,8 +152,8 @@
 "レーティング・システムを拒絶するシステム。"
 
 #. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Appleのバックドア"
+msgid "Back Doors"
+msgstr "バックドア"
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -225,7 +225,9 @@
 "す。"
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Appleの検閲"
 
 #. type: Content of: <p>
@@ -236,8 +238,9 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "AppleのDRM"
+#, fuzzy
+msgid "DRM"
+msgstr "ディジタル制限管理"
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -295,7 +298,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr ""
 
 #. type: Content of: <p>
@@ -343,7 +346,7 @@
 
 #. type: Content of: <h3>
 #, fuzzy
-msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Appleの危険性"
 
 #. type: Content of: <p>
@@ -417,7 +420,7 @@
 #. type: Content of: <h3>
 #, fuzzy
 #| msgid "Apple Surveillance"
-msgid "Apple Interference"
+msgid "Interference"
 msgstr "Appleの監視"
 
 #. type: Content of: <p>
@@ -441,7 +444,9 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Appleの牢獄"
 
 #. type: Content of: <p>
@@ -697,7 +702,7 @@
 "検閲していることを認めました</a>。"
 
 #. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -723,7 +728,9 @@
 "証します。"
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Appleの圧力"
 
 #. type: Content of: <p>
@@ -747,7 +754,9 @@
 "を提供することを拒絶します</a>、Apple Musicの購読者
でない場合。"
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Appleの妨害"
 
 #. type: Content of: <p>
@@ -916,8 +925,33 @@
 "にすべて意図的です。"
 
 #. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Appleの監視"
+msgid "Surveillance"
+msgstr "監視"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1232,7 +1266,9 @@
 "ん。"
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Appleの暴君"
 
 #. type: Content of: <ul><li><p>
@@ -1333,6 +1369,9 @@
 msgid "Updated:"
 msgstr "最終更新:"
 
+#~ msgid "Apple DRM"
+#~ msgstr "AppleのDRM"
+
 #~ msgid ""
 #~ "<a href=\"http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-";
 #~ "think-yo.html\"> iOS, the operating system of the Apple iThings, is a "

Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-apple.nl-diff.html  16 Oct 2019 07:30:04 -0000      1.75
+++ malware-apple.nl-diff.html  19 Oct 2019 10:01:31 -0000      1.76
@@ -96,7 +96,7 @@
 &lt;/div&gt;
 <span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
 
-&lt;h3 id="back-doors"&gt;Apple Back Doors&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="back-doors"&gt;Apple 
Back</strong></del></span> <span 
class="inserted"><ins><em>id="back-doors"&gt;Back</em></ins></span> 
Doors&lt;/h3&gt;
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;&lt;p&gt;
 Mac</strong></del></span>
@@ -154,45 +154,57 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
+&lt;h3 <span class="removed"><del><strong>id="censorship"&gt;Apple 
Censorship&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+Apple censors
+games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from the cr&hellip;app store&lt;/a&gt; because 
of</strong></del></span> <span 
class="inserted"><ins><em>id="censorship"&gt;Censorship&lt;/h3&gt;
+
+&lt;p&gt;Apple mainly uses iOS,</em></ins></span> which <span 
class="removed"><del><strong>political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+banned</strong></del></span> <span 
class="inserted"><ins><em>is</em></ins></span> a <span 
class="removed"><del><strong>program from the App Store&lt;/a&gt; because its 
developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;Apple mainly uses iOS, which is a 
typical jail, to impose censorship
-through the</em></ins></span> Apple <span class="removed"><del><strong>censors
-games,</strong></del></span> <span class="inserted"><ins><em>Store. Please 
refer to the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
-some games from</strong></del></span> <span 
class="inserted"><ins><em>href="#jails"&gt;Apple Jails&lt;/a&gt;
+&lt;li&gt;&lt;p&gt;
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time</strong></del></span> <span 
class="inserted"><ins><em>typical jail, to impose censorship
+through</em></ins></span> the <span class="removed"><del><strong>developers
+fixed one &ldquo;problem&rdquo;,</strong></del></span> Apple <span 
class="removed"><del><strong>complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>Store. Please 
refer to</em></ins></span> the <span class="removed"><del><strong>fifth 
rejection,
+Apple</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the app based</strong></del></span> <span 
class="inserted"><ins><em>href="#jails"&gt;Apple Jails&lt;/a&gt;
 section for more information.&lt;/p&gt;
 
 
-&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
+&lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908150.1"&gt;
-    &lt;p&gt;Apple is putting DRM on iPhone batteries, and</em></ins></span> 
the <span class="removed"><del><strong>cr&hellip;app store&lt;/a&gt; because of 
which political
-points they suggest. Some political points</strong></del></span> <span 
class="inserted"><ins><em>system proprietary
-    software &lt;a href="#M201908150"&gt;turns off certain features when 
batteries</em></ins></span>
-    are <span class="removed"><del><strong>apparently considered
-acceptable.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>replaced other than by 
Apple.&lt;/a&gt;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
-banned a program from the App Store&lt;/a&gt; because its developers
-committed</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704070.1"&gt;
-    &lt;p&gt;DRM makes</em></ins></span> the <span 
class="removed"><del><strong>enormity of disassembling some iThings.
+    &lt;p&gt;Apple is putting DRM</em></ins></span> on <span 
class="inserted"><ins><em>iPhone batteries, and</em></ins></span> the <span 
class="removed"><del><strong>subject matter&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iPhone 7 nearly &lt;a
+&lt;li&gt;&lt;p&gt;
+As</strong></del></span> <span class="inserted"><ins><em>system proprietary
+    software &lt;a href="#M201908150"&gt;turns off certain features when 
batteries
+    are replaced other than by Apple.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704070.1"&gt;
+    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
     href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</em></ins></span>
-    Apple <span class="removed"><del><strong>rejected</strong></del></span> 
<span class="inserted"><ins><em>uses DRM software to prevent people from 
charging</em></ins></span> an <span class="removed"><del><strong>app that 
displayed the locations of</strong></del></span> <span 
class="inserted"><ins><em>iThing
+    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
+    Apple uses DRM software to prevent people from charging an iThing
     with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -220,7 +232,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
+&lt;h3 id="incompatibility"&gt;Incompatibility&lt;/h3&gt;
 
 &lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
 hinder users from switching to any alternative program&mdash;and, in
@@ -261,7 +273,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+&lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
   they do not count as malware. We mention them to refute the
@@ -310,7 +322,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;h3 id="interference"&gt;Interference&lt;/h3&gt;
 &lt;p&gt;Various proprietary programs often mess up the user's system. They
   are like sabotage, but they are not grave enough to qualify for the
   word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and
@@ -328,7 +340,7 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;h3 id="jails"&gt;Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
 iOS, the operating system of the Apple iThings, is the prototype
@@ -437,14 +449,18 @@
   &lt;/li&gt;
 
   &lt;li id="M201509230"&gt;
-    &lt;p&gt;As of 2015, Apple &lt;a
-    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
-    systematically bans apps that endorse abortion rights or would help
+    &lt;p&gt;As</em></ins></span> of 2015, Apple &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+    systematically</em></ins></span> bans apps that endorse abortion rights or 
would help
     women find abortions&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This particular political slant &lt;a
+<span class="removed"><del><strong>&lt;p&gt;
+This</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;This</em></ins></span> particular 
political slant &lt;a
     
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
+    affects other Apple <span class="removed"><del><strong>services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506250"&gt;
@@ -481,233 +497,218 @@
 
   &lt;li id="M201402070"&gt;
     &lt;p&gt;Apple rejected an app that displayed the locations
-    of</em></ins></span> US drone assassinations, giving various excuses. Each
+    of US drone assassinations, giving various excuses. Each
     time the developers fixed one &ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection, Apple &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted</em></ins></span> it was censoring the app based on the subject 
<span class="removed"><del><strong>matter&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
-rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;
-This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-affects other Apple services&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
-    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application which uses this API to render
-    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A bug in the iThings Messages
-      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-        a malicious web site to extract all the user's messaging 
history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    complained about another.  After the fifth rejection, Apple &lt;a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Apple Manipulation&lt;/h3&gt;
+&lt;h3 id="manipulation"&gt;Manipulation&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo;</em></ins></span> are <span 
class="removed"><del><strong>not grave enough</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed</em></ins></span> to <span 
class="removed"><del><strong>qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings</strong></del></span> 
<span class="inserted"><ins><em>mislead users, or make option settings 
hard</em></ins></span>
-    to <span class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
+    interfaces designed to mislead users, or make option settings hard
+    to find&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This allows</em></ins></span> a <span 
class="removed"><del><strong>system upgrade
-         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>company such as</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install the upgrade but the 
downloading alone caused lots of trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to say, &ldquo;We allow users
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
     to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+    to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+&lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;
 
 &lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
-    &lt;p&gt;Apple</em></ins></span> Siri &lt;a
+    &lt;p&gt;Apple Siri &lt;a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
     to give you information&lt;/a&gt; about music charts if you're not an Apple
     Music subscriber.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;The wrongs</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;A vulnerability</strong></del></span> <span 
class="inserted"><ins><em>id="sabotage"&gt;Sabotage&lt;/h3&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;These are situations in which Apple 
employs its power over users
-to directly intervene</em></ins></span> in <span 
class="removed"><del><strong>this section are not precisely malware, since they 
do
-not involve making the program</strong></del></span> <span 
class="inserted"><ins><em>ways</em></ins></span> that <span 
class="removed"><del><strong>runs in</strong></del></span> <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
+&lt;p&gt;These are situations</em></ins></span> in <span 
class="removed"><del><strong>Apple's Image I/O API allowed an attacker
+    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application</strong></del></span> which <span 
class="removed"><del><strong>uses this API</strong></del></span> <span 
class="inserted"><ins><em>Apple employs its power over users</em></ins></span>
+to <span class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>directly intervene in ways that harm them or block 
their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When Apple suspects</em></ins></span> a <span 
class="removed"><del><strong>way that hurts</strong></del></span> <span 
class="inserted"><ins><em>user of fraud, it
-    judges</em></ins></span> the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>case 
secretly and presents the verdict
-    as</em></ins></span> a <span class="removed"><del><strong>lot like 
malware, since they are technical Apple
-actions that harm</strong></del></span> <span class="inserted"><ins><em>fait 
accompli.  The punishment</em></ins></span> to <span 
class="inserted"><ins><em>a user found guilty &lt;a
+    &lt;p&gt;When Apple suspects</em></ins></span> a <span 
class="removed"><del><strong>certain kind</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> of <span 
class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>fraud, it
+    judges the case secretly and presents the verdict
+    as a fait accompli.  The punishment to a user found guilty &lt;a
     
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
-    being cut off for life, which more-or-less cripples</em></ins></span> the 
<span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>user's Apple
-    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
+    being cut off for life, which more-or-less cripples the user's Apple
+    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810240"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug in</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
-    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
-    the performance</em></ins></span> of <span 
class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>older phones to force users to buy their newer
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
+    the <span class="removed"><del><strong>iThings Messages
+      app</strong></del></span> <span class="inserted"><ins><em>performance of 
older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805310"&gt;
-    &lt;p&gt;Apple has &lt;a
-    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple <span 
class="removed"><del><strong>software.&lt;/p&gt;
+    &lt;p&gt;Apple has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>malicious web site</strong></del></span> <span 
class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>to block
-    Telegram in Russia.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This evidently has</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>do with Russia's command to Apple to block
+    Telegram in Russia.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>Apple 
Music</strong></del></span> <span 
class="inserted"><ins><em>Telegram</em></ins></span> client
-      <span class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>is free software on other platforms, but not on
-    iThings. Since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
+    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
     are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
     &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
     
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes</em></ins></span> the <span 
class="removed"><del><strong>user's</strong></del></span> file system <span 
class="inserted"><ins><em>from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+    changes</em></ins></span> the <span class="removed"><del><strong>user's 
messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>file 
system from HFS+  to APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of 
MacOS.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201706060"&gt;
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201706060"&gt;
     &lt;p&gt;Apple will stop &lt;a
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
-    bugs</em></ins></span> for <span class="removed"><del><strong>music files, 
copies them</strong></del></span> <span class="inserted"><ins><em>older model 
iThings&lt;/a&gt;.&lt;/p&gt;
+    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's the nature of proprietary software.&lt;/p&gt;
+    that's the nature of</em></ins></span> proprietary <span 
class="removed"><del><strong>programs often mess up</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains DRM specifically designed</em></ins></span> to <span 
class="inserted"><ins><em>&lt;a
+    iPhone 7 contains DRM specifically designed to &lt;a
     
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
-    brick it if</em></ins></span> an <span class="removed"><del><strong>Apple
-      server, and deletes them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;unauthorized&rdquo; repair shop fixes 
it&lt;/a&gt;.
+    brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer to use the term &lt;a
+    &lt;p&gt;The article uses</em></ins></span> the <span 
class="removed"><del><strong>user's system. They are like 
sabotage,</strong></del></span> <span class="inserted"><ins><em>term 
&ldquo;lock&rdquo;
+    to describe the DRM,</em></ins></span> but <span 
class="removed"><del><strong>they are not grave enough</strong></del></span> 
<span class="inserted"><ins><em>we prefer</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>use the term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
-    handcuffs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;</em></ins></span>
+  &lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</em></ins></span>
-    stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
+    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+    stops users from fixing the security bugs in Quicktime</em></ins></span> 
for <span class="inserted"><ins><em>Windows&lt;/a&gt;,
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;
+  &lt;li id="M201605040"&gt;
     &lt;p&gt;The Apple Music client program &lt;a
-    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
-    the user's file system for music files, copies them to an Apple server,
-    and deletes them&lt;/a&gt;.&lt;/p&gt;
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
+    the <span class="removed"><del><strong>word &ldquo;sabotage&rdquo;. 
Nonetheless, they are nasty</strong></del></span> <span 
class="inserted"><ins><em>user's file system for music files, copies them to an 
Apple server,</em></ins></span>
+    and <span class="removed"><del><strong>wrong. This section describes 
examples of</strong></del></span> <span class="inserted"><ins><em>deletes 
them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201602050"&gt;</em></ins></span>
-    &lt;p&gt;iOS version 9 for iThings &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+  &lt;li id="M201602050"&gt;
+    &lt;p&gt;iOS version 9 for iThings &lt;a
+    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
-    them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    Apple&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>eventually backed off from this policy under
     criticism from the users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510020"&gt;
-    &lt;p&gt;Apple forced millions of iThings to &lt;a
-    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
-    a system upgrade without asking the users&lt;/a&gt;. Apple did not
+    &lt;p&gt;Apple</em></ins></span> forced millions of iThings to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download</em></ins></span>
+    a system upgrade
+         <span class="removed"><del><strong>&lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without</strong></del></span>
 <span class="inserted"><ins><em>without</em></ins></span> asking the 
users&lt;/a&gt;. Apple did not
     forcibly install the upgrade but the downloading alone caused lots
     of trouble.&lt;/p&gt;
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201412040"&gt;
-    &lt;p&gt;Apple &lt;a
-    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted</em></ins></span> from <span 
class="inserted"><ins><em>iPods</em></ins></span> the <span 
class="removed"><del><strong>users. However, it has not 
acknowledged</strong></del></span> <span 
class="inserted"><ins><em>music</em></ins></span> that
-    <span class="removed"><del><strong>this was 
wrong.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
had got from internet music
-    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</strong></del></span>
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple Siri</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M200709270"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201412040"&gt;
+    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
+      about</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+    deleted from iPods the</em></ins></span> music <span 
class="removed"><del><strong>charts if you're not an</strong></del></span> 
<span class="inserted"><ins><em>that users had got from internet music
+    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200709270"&gt;
     &lt;p&gt;&lt;a
-    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;</em></ins></span>
-    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
-  <span class="removed"><del><strong>unlocked.&lt;/a&gt;</strong></del></span>
-    <span class="inserted"><ins><em>unlocked&lt;/a&gt;.</em></ins></span>  The 
&ldquo;upgrade&rdquo; also deactivated applications
+    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+    An</em></ins></span> Apple <span class="removed"><del><strong>Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>firmware &ldquo;upgrade&rdquo; bricked iPhones that 
had been
+    unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple
-  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted from iPods the music that users had got from internet music
-  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
+&lt;h3 <span class="removed"><del><strong>id="sabotage"&gt;Apple 
Sabotage&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>wrongs</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="inserted"><ins><em>the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
+not involve making</strong></del></span>
+    <span class="inserted"><ins><em>app is mandatory at some 
workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>program that runs</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a
+    clarification saying</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> the <span 
class="removed"><del><strong>user.
+But they are a lot like malware, since they are technical Apple
+actions</strong></del></span> <span class="inserted"><ins><em>tests were only 
performed on the
+    Android version of the app, and that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>harm</strong></del></span> <span 
class="inserted"><ins><em>are busy at night &lt;a
     
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+    sending users' personal information</em></ins></span> to <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
@@ -715,44 +716,78 @@
     and DoorDash. But it is likely that most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
+    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>case</em></ins></span> of <span 
class="removed"><del><strong>specific Apple software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Apple Music client
+      program</strong></del></span> <span class="inserted"><ins><em>DoorDash). 
Once this information
     is collected by the company, there is no telling what it will be
     used for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201809070"&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
-    the user's browsing history&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports</em></ins></span>
+    the user's <span class="removed"><del><strong>file system for music files, 
copies them to an Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>browsing 
history&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+stops users from fixing</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>security bugs in Quicktime for
+      Windows&lt;/a&gt;, while refusing</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    illegal</em></ins></span> to <span class="removed"><del><strong>fix them 
itself.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>study 
how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201702150"&gt;
-    &lt;p&gt;Apple proposes &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;iOS version 9 for</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In the latest</em></ins></span> iThings <span 
class="inserted"><ins><em>system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn</em></ins></span> them <span 
class="removed"><del><strong>irreparably if they were repaired by someone other 
than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that
+    this was wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+  An</strong></del></span> <span class="inserted"><ins><em>off&lt;/a&gt;.  A 
more advanced way really does turn
+    them off&mdash;only until 5am.  That's</em></ins></span> Apple <span 
class="removed"><del><strong>firmware &ldquo;upgrade&rdquo; bricked iPhones 
that had been
+  unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated applications
+  not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+  censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
+    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>music that users had got from internet music
+  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone is snooping on 
them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
-  &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201611170"&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -793,7 +828,7 @@
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any <span 
class="removed"><del><strong>of them through
+    security to get at them, but <span class="removed"><del><strong>NSA can 
access any of them through
       &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
@@ -802,7 +837,7 @@
   edited&lt;/a&gt;. The &lt;a
   
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
   things you have not decided to save are even more sensitive than the
-  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>of them through &lt;a
+  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>NSA can access any of them through &lt;a
     
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -987,11 +1022,11 @@
 &lt;/ul&gt;
 
 
-&lt;h3 id="tyrants"&gt;Apple Tyrants&lt;/h3&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+&lt;h3 <span class="removed"><del><strong>id="tyrants"&gt;Apple 
Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>id="tyrants"&gt;Tyrants&lt;/h3&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201412010"&gt;
     &lt;p&gt;Apple</em></ins></span> arbitrarily &lt;a <span 
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
   blocks</strong></del></span>
@@ -1083,7 +1118,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/16 07:30:04 $
+$Date: 2019/10/19 10:01:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-apple.nl.po 16 Oct 2019 07:30:04 -0000      1.76
+++ malware-apple.nl.po 19 Oct 2019 10:01:31 -0000      1.77
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -152,7 +152,10 @@
 "dat niet is &ldquo;goedgekeurd&rdquo; door de fabrikant, niet uitvoeren."
 
 #. type: Content of: <h3>
-msgid "Apple Back Doors"
+# | [-Apple-]Back Doors
+#, fuzzy
+#| msgid "Apple Back Doors"
+msgid "Back Doors"
 msgstr "Apple-achterdeuren"
 
 #. type: Content of: <ul><li><p>
@@ -216,7 +219,10 @@
 "heeft, want natuurlijk kunnen we Apple vertrouwen."
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Apple-censuur"
 
 #. type: Content of: <p>
@@ -227,8 +233,8 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "Apple-DRM"
+msgid "DRM"
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -288,10 +294,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-# | Apple [-Insecurity-] {+Incompatibility+}
+# | [-Apple Insecurity-]{+Incompatibility+}
 #, fuzzy
 #| msgid "Apple Insecurity"
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr "Apple-onveiligheid"
 
 #. type: Content of: <p>
@@ -338,7 +344,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Apple-onveiligheid"
 
 #. type: Content of: <p>
@@ -402,7 +411,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Apple-inmenging"
 
 #. type: Content of: <p>
@@ -427,7 +439,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Apple-tralies"
 
 #. type: Content of: <p>
@@ -664,7 +679,7 @@
 # TODO: please take a look.
 #. type: Content of: <h3>
 #, fuzzy
-msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr "Apple-manipulatie"
 
 #. type: Content of: <ul><li><p>
@@ -690,7 +705,10 @@
 "weinigen begrijpen hoe het echt uit te zetten."
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Apple-invloed"
 
 #. type: Content of: <p>
@@ -715,7 +733,10 @@
 "muziek-hitlijsten als je niet geabonneerd bent op Apple Music."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Apple-sabotage"
 
 #. type: Content of: <p>
@@ -877,11 +898,39 @@
 "html\">Apple-censuur</a>.  Dit was blijkbaar allemaal vooropgezet."
 
 #. type: Content of: <h3>
-msgid "Apple Surveillance"
+# | [-Apple-]Surveillance
+#, fuzzy
+#| msgid "Apple Surveillance"
+msgid "Surveillance"
 msgstr "Apple-spionage"
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1181,7 +1230,10 @@
 "die Apple naar dit adres verstuurt."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Apple-tirannen"
 
 #. type: Content of: <ul><li><p>
@@ -1278,6 +1330,9 @@
 msgid "Updated:"
 msgstr "Bijgewerkt:"
 
+#~ msgid "Apple DRM"
+#~ msgstr "Apple-DRM"
+
 #~ msgid "<a href=\"#deception\">Interference</a>"
 #~ msgstr "<a href=\"#deception\">Oplichterij</a>"
 

Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- malware-apple.pot   16 Oct 2019 07:30:05 -0000      1.86
+++ malware-apple.pot   19 Oct 2019 10:01:31 -0000      1.87
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -121,7 +121,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Back Doors"
+msgid "Back Doors"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -173,7 +173,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+msgid "Censorship"
 msgstr ""
 
 #. type: Content of: <p>
@@ -184,7 +184,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple DRM"
+msgid "DRM"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -234,7 +234,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr ""
 
 #. type: Content of: <p>
@@ -280,7 +280,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr ""
 
 #. type: Content of: <p>
@@ -335,7 +335,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+msgid "Interference"
 msgstr ""
 
 #. type: Content of: <p>
@@ -355,7 +355,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+msgid "Jails"
 msgstr ""
 
 #. type: Content of: <p>
@@ -560,7 +560,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -579,7 +579,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr ""
 
 #. type: Content of: <p>
@@ -598,7 +598,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr ""
 
 #. type: Content of: <p>
@@ -734,7 +734,30 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Surveillance"
+msgid "Surveillance"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a "
+"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\";>
 "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a "
+"back-door allowing developers to run any code they wish in the users' phone, "
+"as &ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory "
+"at some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a "
+"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\";>
 "
+"Washington Post version of the article</a> (partly obfuscated, but readable "
+"after copy-pasting in a text editor) includes a clarification saying that "
+"the tests were only performed on the Android version of the app, and that, "
+"according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance "
+"could not be conducted on Apple's operating system.&rdquo;"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -959,7 +982,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- malware-apple.ru.po 16 Oct 2019 14:28:34 -0000      1.225
+++ malware-apple.ru.po 19 Oct 2019 10:01:31 -0000      1.226
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2019-01-29 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -148,7 +149,7 @@
 "производителем."
 
 #. type: Content of: <h3>
-msgid "Apple Back Doors"
+msgid "Back Doors"
 msgstr "Лазейки"
 
 #. type: Content of: <ul><li><p>
@@ -222,7 +223,10 @@
 "властью, потому что мы, конечно, можем 
доверять Apple."
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Цензура"
 
 #. type: Content of: <p>
@@ -236,7 +240,7 @@
 "\">Тюрьмы</a>."
 
 #. type: Content of: <h3>
-msgid "Apple DRM"
+msgid "DRM"
 msgstr "Цифровое управление ограничениями"
 
 #. type: Content of: <ul><li><p>
@@ -306,7 +310,10 @@
 "своим клиентам, на чем просматривать 
купленные ими видеоролики</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr "Несовместимость"
 
 #. type: Content of: <p>
@@ -377,7 +384,10 @@
 "неподходящими для сохранения 
документов</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Уязвимость"
 
 #. type: Content of: <p>
@@ -462,7 +472,10 @@
 "радиоаппаратуры телефонов есть множество 
ошибок</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Помехи"
 
 #. type: Content of: <p>
@@ -491,7 +504,10 @@
 "заменяются кем-то, кроме Apple.</a>"
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Тюрьмы"
 
 #. type: Content of: <p>
@@ -794,7 +810,10 @@
 "drone-strikes/\">признала, что это цензура 
приложения по тематике</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Manipulation"
+# | [-Apple-]Manipulation
+#, fuzzy
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr "Манипуляция"
 
 #. type: Content of: <ul><li><p>
@@ -820,7 +839,10 @@
 "поймет, как же это отключить."
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Давление"
 
 #. type: Content of: <p>
@@ -845,7 +867,10 @@
 "популярности музыки, если вы не подписаны 
на Apple Music."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Саботаж"
 
 #. type: Content of: <p>
@@ -1045,11 +1070,36 @@
 "по-видимому, сделано преднамеренно."
 
 #. type: Content of: <h3>
-msgid "Apple Surveillance"
+msgid "Surveillance"
 msgstr "Слежка"
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1389,7 +1439,10 @@
 "почты и получить код, который посылает Apple."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Тираны"
 
 #. type: Content of: <ul><li><p>
@@ -1490,6 +1543,9 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
+#~ msgid "Apple DRM"
+#~ msgstr "Цифровое управление ограничениями"
+
 #~ msgid ""
 #~ "It cited a bizarre excuse, but the real reason is surely, &ldquo;China "
 #~ "ordered us to ban it.&rdquo;"

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- nl.po       16 Oct 2019 07:30:05 -0000      1.150
+++ nl.po       19 Oct 2019 10:01:31 -0000      1.151
@@ -665,10 +665,6 @@
 "<a href=\"#tyrants\">Tirannen</a>&mdash;systemen die elk besturingssysteem "
 "dat niet is &ldquo;goedgekeurd&rdquo; door de fabrikant, niet uitvoeren."
 
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Apple-achterdeuren"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
@@ -738,7 +734,10 @@
 "heeft, want natuurlijk kunnen we Apple vertrouwen."
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
 msgstr "Apple-censuur"
 
 #. type: Content of: <p>
@@ -748,10 +747,6 @@
 "section for more information."
 msgstr ""
 
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "Apple-DRM"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -819,10 +814,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-# | Apple [-Insecurity-] {+Incompatibility+}
+# | [-Apple Insecurity-]{+Incompatibility+}
 #, fuzzy
 #| msgid "Apple Insecurity"
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr "Apple-onveiligheid"
 
 #. type: Content of: <p>
@@ -869,7 +864,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr "Apple-onveiligheid"
 
 #. type: Content of: <p>
@@ -943,7 +941,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
 msgstr "Apple-inmenging"
 
 #. type: Content of: <p>
@@ -968,7 +969,10 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
 msgstr "Apple-tralies"
 
 #. type: Content of: <p>
@@ -1257,12 +1261,11 @@
 "apple-app-tracks-drone-strikes/\">gaf Apple toe dat het de app censureerde "
 "op basis van de inhoud</a>."
 
+# TODO: please take a look.
 #. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
 #, fuzzy
-#| msgid "Apple Deception"
-msgid "Apple Manipulation"
-msgstr "Apple-oplichterij"
+msgid "Manipulation"
+msgstr "Apple-manipulatie"
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1287,7 +1290,10 @@
 "weinigen begrijpen hoe het echt uit te zetten."
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr "Apple-invloed"
 
 #. type: Content of: <p>
@@ -1312,7 +1318,10 @@
 "muziek-hitlijsten als je niet geabonneerd bent op Apple Music."
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr "Apple-sabotage"
 
 #. type: Content of: <p>
@@ -1523,9 +1532,30 @@
 "proprietary/proprietary-jails.html\">Apple-censuur</a>.  Dit was blijkbaar "
 "allemaal vooropgezet."
 
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Apple-spionage"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1905,7 +1935,10 @@
 "die Apple naar dit adres verstuurt."
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr "Apple-tirannen"
 
 #. type: Content of: <ul><li><p>
@@ -6716,6 +6749,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "
@@ -7515,21 +7571,21 @@
 "je meestal belazerd."
 
 #. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
+# | As of [-April,-] {+October,+} 2019, the [-files-] {+pages+} in this
+# | directory list around 400 instances of malicious [-functionalities,-]
+# | {+functionalities (with more than 500 references to back them up),+} but
 # | there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
-#| "As of April, 2017, the files in this directory list around 300 instances "
+#| "As of April, 2019, the files in this directory list around 400 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
-"Anno april 2017 staan er in dit overzicht ongeveer 300 gevallen van "
+"Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
 "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
 "gevallen waar we niks van weten."
 
@@ -8872,6 +8928,60 @@
 "processors will have tyrant software built in</a>."
 msgstr ""
 
+#~ msgid "Apple Back Doors"
+#~ msgstr "Apple-achterdeuren"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Apple-censuur"
+
+#~ msgid "Apple DRM"
+#~ msgstr "Apple-DRM"
+
+#, fuzzy
+#~| msgid "Apple Insecurity"
+#~ msgid "Apple Incompatibility"
+#~ msgstr "Apple-onveiligheid"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "Apple-onveiligheid"
+
+#~ msgid "Apple Interference"
+#~ msgstr "Apple-inmenging"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Apple-tralies"
+
+#, fuzzy
+#~| msgid "Apple Deception"
+#~ msgid "Apple Manipulation"
+#~ msgstr "Apple-oplichterij"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Apple-invloed"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Apple-sabotage"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Apple-spionage"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Apple-tirannen"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Anno april 2017 staan er in dit overzicht ongeveer 300 gevallen van "
+#~ "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
+#~ "gevallen waar we niks van weten."
+
 #~ msgid ""
 #~ "This page is licensed under a <a rel=\"license\" href=\"http://";
 #~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- pl.po       16 Oct 2019 07:30:05 -0000      1.149
+++ pl.po       19 Oct 2019 10:01:31 -0000      1.150
@@ -656,10 +656,6 @@
 "systemy, które odrzucają systemy operacyjne nie &bdquo;autoryzowane&rdquo; "
 "przez producenta."
 
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr ""
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
@@ -708,7 +704,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+msgid "Censorship"
 msgstr ""
 
 #. type: Content of: <p>
@@ -718,10 +714,6 @@
 "section for more information."
 msgstr ""
 
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr ""
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -767,7 +759,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr ""
 
 #. type: Content of: <p>
@@ -814,7 +806,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr ""
 
 #. type: Content of: <p>
@@ -870,7 +862,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+msgid "Interference"
 msgstr ""
 
 #. type: Content of: <p>
@@ -890,7 +882,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+msgid "Jails"
 msgstr ""
 
 #. type: Content of: <p>
@@ -1091,7 +1083,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1110,7 +1102,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr ""
 
 #. type: Content of: <p>
@@ -1128,7 +1120,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr ""
 
 #. type: Content of: <p>
@@ -1260,8 +1252,29 @@
 "apparently intentional."
 msgstr ""
 
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1485,7 +1498,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -6039,6 +6052,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "
@@ -6838,9 +6874,9 @@
 
 #. type: Content of: <p>
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 
 #. type: Content of: <table><tr><th>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- pot 16 Oct 2019 07:30:05 -0000      1.148
+++ pot 19 Oct 2019 10:01:31 -0000      1.149
@@ -513,10 +513,6 @@
 "system not &ldquo;authorized&rdquo; by the manufacturer."
 msgstr ""
 
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr ""
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-";
@@ -565,7 +561,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Censorship"
+msgid "Censorship"
 msgstr ""
 
 #. type: Content of: <p>
@@ -575,10 +571,6 @@
 "section for more information."
 msgstr ""
 
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr ""
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -624,7 +616,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
 msgstr ""
 
 #. type: Content of: <p>
@@ -671,7 +663,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Insecurity"
+msgid "Insecurity"
 msgstr ""
 
 #. type: Content of: <p>
@@ -727,7 +719,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Interference"
+msgid "Interference"
 msgstr ""
 
 #. type: Content of: <p>
@@ -747,7 +739,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Jails"
+msgid "Jails"
 msgstr ""
 
 #. type: Content of: <p>
@@ -948,7 +940,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -967,7 +959,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Pressuring"
+msgid "Pressuring"
 msgstr ""
 
 #. type: Content of: <p>
@@ -985,7 +977,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Sabotage"
+msgid "Sabotage"
 msgstr ""
 
 #. type: Content of: <p>
@@ -1117,8 +1109,29 @@
 "apparently intentional."
 msgstr ""
 
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1342,7 +1355,7 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Tyrants"
+msgid "Tyrants"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -5800,6 +5813,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "
@@ -6472,9 +6508,9 @@
 
 #. type: Content of: <p>
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 
 #. type: Content of: <table><tr><th>

Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-back-doors.de-diff.html 4 Oct 2019 08:00:46 -0000       1.32
+++ proprietary-back-doors.de-diff.html 19 Oct 2019 10:01:31 -0000      1.33
@@ -455,10 +455,48 @@
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130.1"&gt;
+    &lt;p&gt;The Chinese Communist Party's &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
+    &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt; was found to contain 
&lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    a back-door allowing developers to run any code they wish&lt;/a&gt; in the
+    users' phone, as &ldquo;superusers.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying</em></ins></span> that <span class="inserted"><ins><em>the tests 
were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant</em></ins></span> it 
<span class="removed"><del><strong>considers malicious.
+      But there</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908220"&gt;
     &lt;p&gt;ChromeBooks are programmed for obsolescence:
-    ChromeOS has a universal back door</em></ins></span> that <span 
class="removed"><del><strong>it considers malicious.
-      But there</strong></del></span> is <span class="inserted"><ins><em>used 
for updates and &lt;a
+    ChromeOS has a universal back door that</em></ins></span> is <span 
class="inserted"><ins><em>used for updates and &lt;a
     
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
     ceases to operate at a predefined date&lt;/a&gt;. From then on, there
     appears to be</em></ins></span> no <span 
class="removed"><del><strong>excuse</strong></del></span> <span 
class="inserted"><ins><em>support whatsoever</em></ins></span> for <span 
class="removed"><del><strong>&lt;em&gt;deleting&lt;/em&gt;</strong></del></span>
 the <span class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;
@@ -844,7 +882,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/04 08:00:46 $
+$Date: 2019/10/19 10:01:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary-back-doors.de.po        4 Oct 2019 08:00:46 -0000       1.131
+++ proprietary-back-doors.de.po        19 Oct 2019 10:01:31 -0000      1.132
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -761,6 +761,54 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-back-doors.es.po        4 Oct 2019 08:59:26 -0000       1.23
+++ proprietary-back-doors.es.po        19 Oct 2019 10:01:32 -0000      1.24
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2019-09-12 12:36+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -658,6 +659,54 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary-back-doors.fr.po        4 Oct 2019 08:52:50 -0000       1.142
+++ proprietary-back-doors.fr.po        19 Oct 2019 10:01:32 -0000      1.143
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2019-10-04 10:51+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -666,6 +667,54 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-back-doors.it-diff.html 4 Oct 2019 08:00:46 -0000       1.59
+++ proprietary-back-doors.it-diff.html 19 Oct 2019 10:01:32 -0000      1.60
@@ -265,9 +265,7 @@
   <span class="inserted"><ins><em>&lt;li id="M201210220"&gt;
     &lt;p id="swindle-eraser"&gt;The Amazon
     Kindle-Swindle</em></ins></span> has a back door that <span 
class="inserted"><ins><em>has been used to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;can
-      &ldquo;upload files&rdquo; as well as forcibly install
-      apps&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;It</strong></del></span>
+      &ldquo;upload</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
     remotely erase books&lt;/a&gt;.  One of the books erased was
     &lt;cite&gt;1984&lt;/cite&gt;, by George Orwell.&lt;/p&gt;
@@ -280,7 +278,7 @@
     offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Do other ebook readers have back doors in their nonfree software? 
We
-    don't know, and we have no way to find out.  There</em></ins></span> is 
<span class="inserted"><ins><em>no reason to
+    don't know, and we have no way to find out.  There is no reason to
     assume that they don't.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -301,7 +299,7 @@
     Google Play store contained a module that was designed to &lt;a
     
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
     install malware on the user's computer&lt;/a&gt;. The app developers
-    regularly</em></ins></span> used <span class="inserted"><ins><em>it to 
make the computer download and execute any code
+    regularly used it to make the computer download and execute any code
     they wanted.&lt;/p&gt;
 
     &lt;p&gt;This is a concrete example of what users are exposed to when they
@@ -316,16 +314,13 @@
     (all?) apps.&lt;/p&gt;
 
     &lt;p&gt;The specific change described in the article was not
-    malicious&mdash;it protected users from surveillance</em></ins></span> by 
<span class="removed"><del><strong>14,000 Android 
applications.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
-    parties&mdash;but that is a separate question.&lt;/p&gt;</em></ins></span>
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
   &lt;/li&gt;
   
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable 
modem</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro</em></ins></span> has a &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a &lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
     back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article is full of confusions, errors and biases that we have
@@ -333,9 +328,7 @@
 
     &lt;ul&gt;
     &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
-    any particular thing</em></ins></span> in <span 
class="inserted"><ins><em>its products. What it does enable</em></ins></span> 
the <span class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with</strong></del></span> 
<span class="inserted"><ins><em>company
+    any particular thing in its products. What it does enable the company
     to do is sue other companies if they do some particular thing in
     their products.&lt;/li&gt;
 
@@ -350,27 +343,22 @@
     please don't smear sharing.&lt;/li&gt;
 
     &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
-    total confusion. The term &ldquo;IP&rdquo; itself is a</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/not-ipr.html"&gt;bogus 
generalization about things
+    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
     that have nothing in common&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;In addition,</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>speak of &ldquo;protecting&rdquo; that bogus
-    generalization is a separate absurdity. It's like 
calling</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
-     remotely.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;li&gt;&lt;p&gt;
-Mac OS X had</strong></del></span> <span class="inserted"><ins><em>cops
+    &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
     because neighbors' kids are playing on your front yard, and saying
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
-    to the boundary line, not even with a jackhammer, because it 
is</em></ins></span> an
-    <span class="inserted"><ins><em>abstraction and can't be affected by 
physical action.&lt;/p&gt;&lt;/li&gt;
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
     &lt;/ul&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-intentional local</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We link to the article for the facts it presents. It
@@ -381,182 +369,240 @@
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has 
a</em></ins></span> back door <span class="removed"><del><strong>for 4 
years&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> that &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-    can &ldquo;upload files&rdquo; as well as forcibly install
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    can &ldquo;upload</em></ins></span> files&rdquo; as well as forcibly 
install
     apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201112080"&gt;
-    &lt;p&gt; In addition</em></ins></span> to <span 
class="removed"><del><strong>replace</strong></del></span> <span 
class="inserted"><ins><em>its &lt;a href="#windows-update"&gt;universal back
-    door&lt;/a&gt;,</em></ins></span> Windows <span 
class="removed"><del><strong>7 and</strong></del></span> 8 <span 
class="removed"><del><strong>with all-spying 
-    Windows 10&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable modem has 
a</strong></del></span>
 
-    &lt;p&gt;Microsoft was in fact</strong></del></span> <span 
class="inserted"><ins><em>has a back door for</em></ins></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching 
on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
+    &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
+    door&lt;/a&gt;, Windows 8 has a back door for &lt;a
+    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You might well decide to let</em></ins></span> a <span 
class="removed"><del><strong>flag</strong></del></span> <span 
class="inserted"><ins><em>security service that you trust
-    remotely &lt;em&gt;deactivate&lt;/em&gt; programs</em></ins></span> that 
<span class="removed"><del><strong>said whether to &ldquo;upgrade&rdquo; to 
Windows 10 when users 
-    had turned</strong></del></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
-
-    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
-    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
-    how to permanently reject</strong></del></span> <span 
class="inserted"><ins><em>considers malicious.
+    &lt;p&gt;You might well decide to let a security service that you trust
+    remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
     But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
-    should have</em></ins></span> the <span 
class="removed"><del><strong>downgrade</strong></del></span> <span 
class="inserted"><ins><em>right</em></ins></span> to <span 
class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>decide whom (if anyone)</em></ins></span> to <span 
class="removed"><del><strong>involve use of a back door</strong></del></span> 
<span class="inserted"><ins><em>trust</em></ins></span> in <span 
class="removed"><del><strong>Windows 7 and 8.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>this
-    way.&lt;/p&gt;</em></ins></span>
+    should have the right to decide whom (if anyone) to trust in this
+    way.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Most mobile phones have a universal back door, which has been used 
to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;
-    &lt;p&gt;In Android,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-turn them malicious&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google</em></ins></span> has a <span 
class="removed"><del><strong>universal back door&lt;/a&gt;. Nearly all
-models of mobile phones have a universal</strong></del></span> back door <span 
class="inserted"><ins><em>to remotely delete apps&lt;/a&gt;. (It 
was</em></ins></span> in <span class="removed"><del><strong>the modem chip. So
-why did Coolpad bother</strong></del></span> <span class="inserted"><ins><em>a
-    program called GTalkService, which seems since then</em></ins></span> to 
<span class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>have been
+  &lt;li id="M201103070"&gt;
+    &lt;p&gt;In Android, &lt;a
+    
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
+    Google has a back door to remotely delete apps&lt;/a&gt;. (It was in a
+    program called GTalkService, which seems since then to have been
     merged into Google Play.)&lt;/p&gt;
 
     &lt;p&gt;Google can also &lt;a
     
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  
This</em></ins></span> is <span class="removed"><del><strong>controlled
-by Coolpad.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Microsoft Windows has</strong></del></span>
-    <span class="inserted"><ins><em>not equivalent to</em></ins></span> a 
universal back <span class="removed"><del><strong>door through which
-&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever can be imposed on the users&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;More information on when
-&lt;a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;</strong></del></span>
 <span class="inserted"><ins><em>door, but permits various dirty
+    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  This is
+    not equivalent to a universal back door, but permits various dirty
     tricks.&lt;/p&gt;
 
-    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; 
of</em></ins></span> this <span class="removed"><del><strong>was used&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;In Windows 10,</strong></del></span> <span 
class="inserted"><ins><em>power has not been
-    malicious so far,</em></ins></span> the <span 
class="removed"><del><strong>universal back door</strong></del></span> <span 
class="inserted"><ins><em>point</em></ins></span> is <span 
class="removed"><del><strong>no longer hidden; all
-&ldquo;upgrades&rdquo; will</strong></del></span> <span 
class="inserted"><ins><em>that nobody should have such power,
-    which could also</em></ins></span> be <span 
class="removed"><del><strong>&lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
-and immediately imposed&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;German government &lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span 
class="inserted"><ins><em>used maliciously.  You might well decide to
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
+    malicious so far, the point is that nobody should have such power,
+    which could also be used maliciously.  You might well decide to
     let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for allowing 
it</em></ins></span> to <span class="removed"><del><strong>potential back
-door capabilities of</strong></del></span>
-    <span 
class="inserted"><ins><em>&lt;em&gt;delete&lt;/em&gt;</em></ins></span> the 
<span class="removed"><del><strong>TPM 2.0 
chip&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>programs, and you should have the right to decide
-    who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
+    it considers malicious.  But there is no excuse for allowing it to
+    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
+    who (if anyone) to trust in this way.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
+  &lt;li id="M200808110"&gt;
     &lt;p&gt;The iPhone has a back door &lt;a
     
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
     that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's <span 
class="removed"><del><strong>ok</strong></del></span> <span 
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
-    this power because of course we can trust <span 
class="removed"><del><strong>Apple.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;</em></ins></span>
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
+    this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The iPhone</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130.1"&gt;
+    &lt;p&gt;The Chinese Communist Party's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
+    &ldquo;Study</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with</strong></del></span> 
<span class="inserted"><ins><em>Great Nation&rdquo; app&lt;/a&gt; was found to 
contain</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    a</em></ins></span> back-door <span class="inserted"><ins><em>allowing 
developers</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>run any code they wish&lt;/a&gt; in</em></ins></span> 
the <span class="removed"><del><strong>engine&lt;/a&gt;
+     remotely.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;li&gt;&lt;p&gt;
+Mac OS X had an</strong></del></span>
+    <span class="inserted"><ins><em>users' phone, as 
&ldquo;superusers.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local back door for 4 years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users reported</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying</em></ins></span> that <span class="inserted"><ins><em>the tests 
were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it</em></ins></span> 
&lt;a 
+    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access</em></ins></span> to <span class="removed"><del><strong>replace 
Windows 7</strong></del></span> <span class="inserted"><ins><em>the phone's 
microphone, photos, text messages, contacts,</em></ins></span> and <span 
class="removed"><del><strong>8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft</strong></del></span>
+    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version</em></ins></span> was <span class="inserted"><ins><em>found to 
contain a
+    back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers</strong></del></span>
+     <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying</em></ins></span> that <span 
class="removed"><del><strong>run Windows 7</strong></del></span> <span 
class="inserted"><ins><em>the tests were only performed on the
+    Android version of the app,</em></ins></span> and <span 
class="removed"><del><strong>8&lt;/a&gt;, switching</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be 
conducted</em></ins></span>
+    on <span class="inserted"><ins><em>Apple's operating 
system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908220"&gt;
     &lt;p&gt;ChromeBooks are programmed for obsolescence:
-    ChromeOS</em></ins></span> has a <span 
class="inserted"><ins><em>universal</em></ins></span> back door <span 
class="inserted"><ins><em>that is used</em></ins></span> for <span 
class="inserted"><ins><em>updates and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-remote wipe&lt;/a&gt;.  It's not always enabled, but</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
-    ceases to operate at a predefined date&lt;/a&gt;. From then on, there
-    appears to be no support whatsoever for the computer.&lt;/p&gt;
+    ChromeOS has</em></ins></span> a <span 
class="removed"><del><strong>flag</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> that <span 
class="removed"><del><strong>said whether</strong></del></span> <span 
class="inserted"><ins><em>is used for updates and &lt;a
+    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
+    ceases</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>operate at a predefined date&lt;/a&gt;. From then on, 
there
+    appears</em></ins></span> to <span class="removed"><del><strong>Windows 
10</strong></del></span> <span class="inserted"><ins><em>be no support 
whatsoever for the computer.&lt;/p&gt;
+
+    &lt;p&gt;In other words,</em></ins></span> when <span 
class="removed"><del><strong>users 
+    had turned it off.&lt;/p&gt;
 
-    &lt;p&gt;In other words, when you stop getting screwed by the back door,
+    &lt;p&gt;Later on, Microsoft published instructions 
on</strong></del></span> <span class="inserted"><ins><em>you stop getting 
screwed by the back door,
     you start getting screwed by the obsolescence.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access</em></ins></span> to <span 
class="removed"><del><strong>permanently reject</strong></del></span> the <span 
class="removed"><del><strong>downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>internal car network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>involve 
use of</strong></del></span> <span class="inserted"><ins><em>the cellular phone 
network and sends Ford</em></ins></span> a <span 
class="removed"><del><strong>back door in Windows 7</strong></del></span> <span 
class="inserted"><ins><em>lot of data,
     including car location. This feature operates even when the ignition
-    key is removed, and</em></ins></span> users <span 
class="removed"><del><strong>are led into enabling</strong></del></span> <span 
class="inserted"><ins><em>report that they can't disable it.&lt;/p&gt;
+    key is removed,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
-    antenna in aluminum foil?&lt;/p&gt;
+    antenna in aluminum foil?&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201812300"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Most mobile phones have</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812300"&gt;
     &lt;p&gt;New GM cars &lt;a
     href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
+    offer the feature of</em></ins></span> a universal back <span 
class="removed"><del><strong>door, which</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Every nonfree program offers the user zero security against its
-    developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;
+    developer. With this malfeature, GM</em></ins></span> has <span 
class="removed"><del><strong>been used to
+&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>explicitly 
made things even
+    worse.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely 
convert</em></ins></span> it <span class="removed"><del><strong>without 
understanding.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>into one.&lt;/p&gt;</em></ins></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A Chinese version of Android</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;</em></ins></span>
+    universal back door&lt;/a&gt;. <span class="removed"><del><strong>Nearly 
all
+models of mobile phones have a universal back door in</strong></del></span> 
<span class="inserted"><ins><em>If</em></ins></span> the <span 
class="removed"><del><strong>modem chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
+    listening device, remote changes</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this one is controlled
+by Coolpad.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the code 
could surely convert it
+    into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apple can,</strong></del></span>
+&lt;p&gt;Microsoft Windows</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711010"&gt;
-    &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
+    &lt;p&gt;Sony</em></ins></span> has <span class="removed"><del><strong>a 
universal</strong></del></span> <span 
class="inserted"><ins><em>brought</em></ins></span> back <span 
class="removed"><del><strong>door through which
+&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever can be imposed on the users&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;More information on when
+&lt;a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;</strong></del></span>
 <span class="inserted"><ins><em>its robotic pet Aibo,</em></ins></span> this 
<span class="removed"><del><strong>was used&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;In Windows 10, the</strong></del></span> <span 
class="inserted"><ins><em>time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with a universal back door, and tethered to a server that requires
-    a subscription&lt;/a&gt;.&lt;/p&gt;
+    with a</em></ins></span> universal back <span 
class="removed"><del><strong>door is no longer hidden; all
+&ldquo;upgrades&rdquo; will
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>door,</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>tethered to a 
server that requires
+    a subscription&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201709090.1"&gt;
-    &lt;p&gt;Tesla used software to limit the part of the battery
-    that was available to customers in some cars,</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
-    a universal back door in the software&lt;/a&gt; to temporarily increase
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;German government &lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+away from Windows 8 computers with TPM 2.0 due</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709090.1"&gt;
+    &lt;p&gt;Tesla used software</em></ins></span> to <span 
class="removed"><del><strong>potential back
+door capabilities</strong></del></span> <span class="inserted"><ins><em>limit 
the part</em></ins></span> of the <span class="removed"><del><strong>TPM 2.0 
chip&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The iPhone has</strong></del></span> <span 
class="inserted"><ins><em>battery
+    that was available to customers in some cars, and &lt;a
+    
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;</em></ins></span>
+    a <span class="inserted"><ins><em>universal</em></ins></span> back door
+<span class="removed"><del><strong>&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+that allows Apple</strong></del></span> <span class="inserted"><ins><em>in the 
software&lt;/a&gt;</em></ins></span> to <span 
class="inserted"><ins><em>temporarily increase
     this limit.&lt;/p&gt;
 
-    &lt;p&gt;While</em></ins></span> remotely <span 
class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>allowing car &ldquo;owners&rdquo; to use the
-    whole battery capacity did not do them any harm, the same back
-    door would permit Tesla (perhaps under the command of</em></ins></span> 
some <span class="removed"><del><strong>data from iPhones 
for</strong></del></span>
+    &lt;p&gt;While</em></ins></span> remotely <span 
class="removed"><del><strong>delete apps&lt;/a&gt; which Apple considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for 
Apple</strong></del></span> <span class="inserted"><ins><em>allowing car 
&ldquo;owners&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>have this power
+because of course we can trust Apple.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The iPhone has a</strong></del></span> <span 
class="inserted"><ins><em>use the
+    whole battery capacity did not do them any harm, the 
same</em></ins></span> back
+    door <span class="removed"><del><strong>for
+&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,
+    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract</strong></del></span> <span class="inserted"><ins><em>would 
permit Tesla (perhaps under the command of</em></ins></span> some <span 
class="removed"><del><strong>data from iPhones for</strong></del></span>
     <span class="inserted"><ins><em>government) to remotely 
order</em></ins></span> the <span class="removed"><del><strong>state&lt;/a&gt;.
   &lt;/p&gt;
   &lt;p&gt;This may</strong></del></span> <span class="inserted"><ins><em>car 
to use none of its battery. Or
@@ -888,7 +934,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/04 08:00:46 $
+$Date: 2019/10/19 10:01:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary-back-doors.it.po        4 Oct 2019 08:00:46 -0000       1.124
+++ proprietary-back-doors.it.po        19 Oct 2019 10:01:32 -0000      1.125
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -778,6 +778,54 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary-back-doors.ja-diff.html 4 Oct 2019 08:00:47 -0000       1.57
+++ proprietary-back-doors.ja-diff.html 19 Oct 2019 10:01:32 -0000      1.58
@@ -353,176 +353,215 @@
     &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
   
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable modem has a
-  &lt;a 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable 
modem</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
+    &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
+    door&lt;/a&gt;, Windows 8 has a back door for &lt;a
+    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+    remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;You might well decide to let a security service that you trust
+    remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
+    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
+    should have the right to decide whom (if anyone) to trust in this
+    way.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201103070"&gt;
+    &lt;p&gt;In Android, &lt;a
+    
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
+    Google</em></ins></span> has a
+  <span class="removed"><del><strong>&lt;a 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
   backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
-     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span>
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span class="inserted"><ins><em>back door to 
remotely delete apps&lt;/a&gt;. (It was in a
+    program called GTalkService, which seems since then to have been
+    merged into Google Play.)&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
-    &lt;p&gt; In addition</em></ins></span> to <span 
class="removed"><del><strong>shutoff the engine&lt;/a&gt;
-     remotely.&lt;/p&gt;
+    &lt;p&gt;Google can also &lt;a
+    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  This is
+    not equivalent to a universal back door, but permits various dirty
+    tricks.&lt;/p&gt;
+
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
+    malicious so far, the point is that nobody should have such power,
+    which could also be used maliciously.  You might well decide to
+    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
+    it considers malicious.  But there is no excuse for allowing 
it</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span>
+    <span 
class="inserted"><ins><em>&lt;em&gt;delete&lt;/em&gt;</em></ins></span> the 
<span class="removed"><del><strong>engine&lt;/a&gt;
+     remotely.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>programs, and you should have the right to decide
+    who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;li&gt;&lt;p&gt;
-Mac OS X had an</strong></del></span> <span 
class="inserted"><ins><em>its</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-intentional local</strong></del></span> <span 
class="inserted"><ins><em>href="#windows-update"&gt;universal back
-    door&lt;/a&gt;, Windows 8 has a</em></ins></span> back door for <span 
class="removed"><del><strong>4 years&lt;/a&gt;.
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;
+    &lt;p&gt;The iPhone has a</em></ins></span> back door <span 
class="removed"><del><strong>for 4 years&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;Users reported that</strong></del></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
-    remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</em></ins></span>
+    that <span class="inserted"><ins><em>allows Apple to remotely delete 
apps&lt;/a&gt; which Apple considers
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
+    this power because of course we can trust Apple.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;You might well decide</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7 and 8 with all-spying 
-    Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Microsoft was in fact &lt;a 
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching 
on</strong></del></span> <span class="inserted"><ins><em>let</em></ins></span> 
a <span class="removed"><del><strong>flag</strong></del></span> <span 
class="inserted"><ins><em>security service that you trust
-    remotely &lt;em&gt;deactivate&lt;/em&gt; programs</em></ins></span> that 
<span class="removed"><del><strong>said whether to &ldquo;upgrade&rdquo; to 
Windows 10 when users 
-    had turned</strong></del></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
-
-    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
-    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
-    how to permanently reject</strong></del></span> <span 
class="inserted"><ins><em>considers malicious.
-    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt;</em></ins></span> 
the <span class="removed"><del><strong>downgrade</strong></del></span> <span 
class="inserted"><ins><em>programs, and you
-    should have the right</em></ins></span> to <span 
class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;
+&lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
-    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>decide whom (if anyone)</em></ins></span> to <span 
class="removed"><del><strong>involve use of a back door</strong></del></span> 
<span class="inserted"><ins><em>trust</em></ins></span> in <span 
class="removed"><del><strong>Windows 7 and 8.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>this
-    way.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130.1"&gt;
+    &lt;p&gt;The Chinese Communist Party's</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
+    &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt;</em></ins></span> was 
<span class="removed"><del><strong>forcing them</strong></del></span> <span 
class="inserted"><ins><em>found</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Most mobile phones have a universal back door, which has been used 
to</strong></del></span>
+    &lt;p&gt;Microsoft was in fact</strong></del></span> <span 
class="inserted"><ins><em>contain</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    a back-door allowing developers to</em></ins></span> run <span 
class="removed"><del><strong>Windows 7 and 8&lt;/a&gt;, switching 
on</strong></del></span> <span class="inserted"><ins><em>any code they 
wish&lt;/a&gt; in the
+    users' phone, as &ldquo;superusers.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes</em></ins></span> a 
<span class="removed"><del><strong>flag</strong></del></span> <span 
class="inserted"><ins><em>clarification
+    saying</em></ins></span> that <span class="removed"><del><strong>said 
whether to &ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>the tests were only performed on the Android version
+    of the app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>Windows 10 when</strong></del></span> <span 
class="inserted"><ins><em>Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires</em></ins></span> users 
+    <span class="removed"><del><strong>had turned</strong></del></span> <span 
class="inserted"><ins><em>to grant</em></ins></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions 
on</strong></del></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access</em></ins></span> to <span class="removed"><del><strong>permanently 
reject</strong></del></span> the <span class="removed"><del><strong>downgrade 
to Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
+    internet history&lt;/a&gt;, and the Android version was 
found</em></ins></span> to <span class="removed"><del><strong>involve use 
of</strong></del></span> <span 
class="inserted"><ins><em>contain</em></ins></span> a <span 
class="removed"><del><strong>back door</strong></del></span>
+    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish</em></ins></span> in <span class="removed"><del><strong>Windows 
7</strong></del></span> <span class="inserted"><ins><em>the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading</em></ins></span> and 
<span class="removed"><del><strong>8.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;
-    &lt;p&gt;In Android,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+&lt;li&gt;
+&lt;p&gt;Most mobile phones have a universal back door, which has been used 
to</strong></del></span> <span class="inserted"><ins><em>using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
 turn them malicious&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google</em></ins></span> has a <span 
class="removed"><del><strong>universal back door&lt;/a&gt;. Nearly all
-models of mobile phones have a universal</strong></del></span> back door <span 
class="inserted"><ins><em>to remotely delete apps&lt;/a&gt;. (It 
was</em></ins></span> in <span class="removed"><del><strong>the modem chip. So
-why did Coolpad bother</strong></del></span> <span class="inserted"><ins><em>a
-    program called GTalkService, which seems since then</em></ins></span> to 
<span class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>have been
-    merged into Google Play.)&lt;/p&gt;
-
-    &lt;p&gt;Google can also &lt;a
-    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  
This</em></ins></span> is <span class="removed"><del><strong>controlled
+A Chinese</strong></del></span>
+     <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post</em></ins></span> version of <span 
class="removed"><del><strong>Android has</strong></del></span> <span 
class="inserted"><ins><em>the article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>universal back door&lt;/a&gt;. Nearly all
+models of mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes</em></ins></span> a <span 
class="removed"><del><strong>universal back door in</strong></del></span>
+    <span class="inserted"><ins><em>clarification saying 
that</em></ins></span> the <span class="removed"><del><strong>modem chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the
+    Android version of the app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this one is controlled
 by Coolpad.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple, 
&ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;Microsoft Windows has</strong></del></span>
-    <span class="inserted"><ins><em>not equivalent to</em></ins></span> a 
universal back <span class="removed"><del><strong>door through which
-&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever can be imposed on the users&lt;/a&gt;.
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Microsoft Windows</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908220"&gt;
+    &lt;p&gt;ChromeBooks are programmed for obsolescence:
+    ChromeOS</em></ins></span> has a universal back door <span 
class="removed"><del><strong>through which</strong></del></span> <span 
class="inserted"><ins><em>that is used for updates and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
+    ceases to operate at a predefined date&lt;/a&gt;. From then on, there
+    appears to</em></ins></span> be <span class="removed"><del><strong>imposed 
on</strong></del></span> <span class="inserted"><ins><em>no support whatsoever 
for</em></ins></span> the <span class="removed"><del><strong>users&lt;/a&gt;.
 &lt;/p&gt;
 &lt;p&gt;More information on when
 &lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
 this was used&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;In Windows 10,</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various dirty
-    tricks.&lt;/p&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
-    malicious so far,</em></ins></span> the <span 
class="removed"><del><strong>universal back door</strong></del></span> <span 
class="inserted"><ins><em>point</em></ins></span> is <span 
class="removed"><del><strong>no longer hidden; all
-&ldquo;upgrades&rdquo; will</strong></del></span> <span 
class="inserted"><ins><em>that nobody should have such power,
-    which could also</em></ins></span> be <span 
class="removed"><del><strong>&lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
+    &lt;p&gt;In <span class="removed"><del><strong>Windows 
10,</strong></del></span> <span class="inserted"><ins><em>other words, when you 
stop getting screwed by</em></ins></span> the <span 
class="removed"><del><strong>universal back door is no longer hidden; all
+&ldquo;upgrades&rdquo; will
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
 and immediately imposed&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Windows 8's back doors are so gaping</strong></del></span> <span 
class="inserted"><ins><em>used maliciously.  You might well decide to
-    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; 
programs</em></ins></span> that
-<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;
-the German government has decided</strong></del></span>
-    it <span class="removed"><del><strong>can't be trusted&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>considers 
malicious.  But there is no excuse for allowing it to
-    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
-    who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Windows 8's</strong></del></span> back <span 
class="removed"><del><strong>doors are so gaping that
+&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>door,
+    you start getting screwed by</em></ins></span> the <span 
class="removed"><del><strong>German government has decided it can't be 
trusted&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obsolescence.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
-    &lt;p&gt;The iPhone has a back door &lt;a
-    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-    that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's <span 
class="removed"><del><strong>ok</strong></del></span> <span 
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
-    this power because of course we can trust <span 
class="removed"><del><strong>Apple.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The iPhone</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-
-&lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201908220"&gt;
-    &lt;p&gt;ChromeBooks are programmed for obsolescence:
-    ChromeOS</em></ins></span> has a <span 
class="inserted"><ins><em>universal</em></ins></span> back door <span 
class="inserted"><ins><em>that is used</em></ins></span> for
-<span class="removed"><del><strong>&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
-it without understanding.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>updates</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
-    ceases to operate at a predefined date&lt;/a&gt;. From then on, there
-    appears to be no support whatsoever</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;
-
-    &lt;p&gt;In other words, when you stop getting screwed by the back door,
-    you start getting screwed by the obsolescence.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
+  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>FordPass Connect feature of some Ford 
vehicles</em></ins></span> has <span class="removed"><del><strong>a back 
door</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+that allows Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for 
Apple</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>improved with</strong></del></span> <span 
class="inserted"><ins><em>you succeeded in breaking the
+    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>this power
+because</strong></del></span> <span class="inserted"><ins><em>you succeeded in 
breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;New GM cars &lt;a
+    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
+    offer the feature</em></ins></span> of <span 
class="removed"><del><strong>course we can trust Apple.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a universal 
back door&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Every nonfree program offers the user zero</em></ins></span> 
security <span class="removed"><del><strong>improvements&lt;/a&gt;; 
but</strong></del></span> <span class="inserted"><ins><em>against its
+    &lt;p&gt;Every nonfree program offers the user zero security against its
     developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;
+    worse.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711244"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>back door for
+&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span> <span 
class="inserted"><ins><em>product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
     listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -872,7 +911,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/04 08:00:47 $
+$Date: 2019/10/19 10:01:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary-back-doors.ja.po        4 Oct 2019 08:00:47 -0000       1.105
+++ proprietary-back-doors.ja.po        19 Oct 2019 10:01:32 -0000      1.106
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -602,6 +602,54 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary-back-doors.pot  4 Oct 2019 08:00:47 -0000       1.73
+++ proprietary-back-doors.pot  19 Oct 2019 10:01:33 -0000      1.74
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -454,6 +454,50 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201910130\"> &ldquo;Study "
+"the Great Nation&rdquo; app</a> was found to contain <a "
+"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\";>
 "
+"a back-door allowing developers to run any code they wish</a> in the users' "
+"phone, as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a "
+"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\";>
 "
+"Washington Post version of the article</a> (partly obfuscated, but readable "
+"after copy-pasting in a text editor) includes a clarification saying that "
+"the tests were only performed on the Android version of the app, and that, "
+"according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance "
+"could not be conducted on Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a "
+"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\";>
 "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a "
+"back-door allowing developers to run any code they wish in the users' phone, "
+"as &ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory "
+"at some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a "
+"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\";>
 "
+"Washington Post version of the article</a> (partly obfuscated, but readable "
+"after copy-pasting in a text editor) includes a clarification saying that "
+"the tests were only performed on the Android version of the app, and that, "
+"according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance "
+"could not be conducted on Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a "
 
"href=\"https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\";>
 "

Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary-back-doors.ru.po        4 Oct 2019 10:30:43 -0000       1.191
+++ proprietary-back-doors.ru.po        19 Oct 2019 10:01:33 -0000      1.192
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2018-11-13 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -652,6 +653,54 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as &ldquo;superusers.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary-surveillance.de-diff.html       3 Oct 2019 10:32:23 -0000       
1.98
+++ proprietary-surveillance.de-diff.html       19 Oct 2019 10:01:33 -0000      
1.99
@@ -967,6 +967,26 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909091"&gt;
     &lt;p&gt;The Facebook app &lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
@@ -3581,7 +3601,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/03 10:32:23 $
+$Date: 2019/10/19 10:01:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.313
retrieving revision 1.314
diff -u -b -r1.313 -r1.314
--- proprietary-surveillance.de.po      3 Oct 2019 10:32:23 -0000       1.313
+++ proprietary-surveillance.de.po      19 Oct 2019 10:01:33 -0000      1.314
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1969,6 +1969,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-surveillance.es.po      4 Oct 2019 08:49:16 -0000       1.6
+++ proprietary-surveillance.es.po      19 Oct 2019 10:01:33 -0000      1.7
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2019-10-04 10:39+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -1479,6 +1480,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.479
retrieving revision 1.480
diff -u -b -r1.479 -r1.480
--- proprietary-surveillance.fr.po      3 Oct 2019 11:13:15 -0000       1.479
+++ proprietary-surveillance.fr.po      19 Oct 2019 10:01:33 -0000      1.480
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2019-10-03 13:12+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1476,6 +1477,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary-surveillance.it-diff.html       3 Oct 2019 10:32:23 -0000       
1.165
+++ proprietary-surveillance.it-diff.html       19 Oct 2019 10:01:33 -0000      
1.166
@@ -1078,19 +1078,17 @@
     reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>this is used for repression</em></ins></span> of 
<span class="removed"><del><strong>its phones. The app will give Verizon the 
same
-   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+    &lt;p&gt;The fact</em></ins></span> that <span 
class="inserted"><ins><em>this is used for repression of forbidden sharing
+    makes</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
+        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span class="removed"><del><strong>its phones. The 
app will give Verizon</strong></del></span> <span 
class="inserted"><ins><em>nonfree software
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying for</em></ins></span> the <span class="removed"><del><strong>users' 
searches that Google normally gets when
    they use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently, the app</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
-    is <span class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span> 
<span class="inserted"><ins><em>not a cure for</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>injustice of 
nonfree software. It may avoid
-    paying for</em></ins></span> the <span class="inserted"><ins><em>nasty 
thing, but cannot make it less nasty.&lt;/p&gt;
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1100,204 +1098,228 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
+    the <span class="inserted"><ins><em>Great Nation&rdquo;</em></ins></span> 
app <span class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>requires users to grant it</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>phone's 
microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>Android version was found to contain a
+    back-door allowing developers to run any code they wish 
in</em></ins></span> the <span class="inserted"><ins><em>users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using 
this</em></ins></span>
+    app <span class="removed"><del><strong>remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> is
+    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span> <span class="inserted"><ins><em>mandatory at some 
workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to</strong></del></span>
+     <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application 
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes 
a
+    clarification saying that the tests were</em></ins></span> only
+  <span class="removed"><del><strong>can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>performed</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>the
+    Android version</em></ins></span> of <span 
class="removed"><del><strong>data in</strong></del></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>app,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving</em></ins></span> the app <span 
class="removed"><del><strong>remains spyware&mdash;an &ldquo;optional&rdquo; 
piece</strong></del></span> <span class="inserted"><ins><em>broad permissions 
in order to use one</em></ins></span> of <span 
class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
+    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>tracks</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when it is turned off&lt;/a&gt;,</em></ins></span> after 
<span class="inserted"><ins><em>tricking them
+    into giving</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
+        for surveillance is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span> app 
<span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order to use one of its
     functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and 
Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data</strong></del></span>
+    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app</strong></del></span> 
<span class="inserted"><ins><em>Maya</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share the picture you take 
according</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
     send intimate details of users' lives</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can</strong></del></span> <span class="inserted"><ins><em>proprietary
-    program is a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle 
sight.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded the list</em></ins></span> of <span 
class="removed"><del><strong>data in</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Keeping track of</em></ins></span> who <span 
class="inserted"><ins><em>downloads a proprietary
+    program</em></ins></span> is <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>list of all</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not be a list of who has installed
+    &lt;p&gt;With a free program there would not</em></ins></span> be
+      <span class="removed"><del><strong>sent across the 
wire</strong></del></span> <span class="inserted"><ins><em>a list of who has 
installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
-    of</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;
-        for surveillance is inadequate</strong></del></span> <span 
class="inserted"><ins><em>operating system, in order to 
gather</em></ins></span> as <span class="removed"><del><strong>a 
protection</strong></del></span> <span class="inserted"><ins><em>much private 
data as
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
+    of <span class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>operating system, in 
order</em></ins></span> to <span class="inserted"><ins><em>gather as much 
private data as
     they possibly can.&lt;/p&gt;
 
-    &lt;p&gt;Thus, we can't trust rules</em></ins></span> against <span 
class="removed"><del><strong>massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+    users' movements even when the user says</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not</em></ins></span> to <span class="removed"><del><strong>increased 
snooping&lt;/a&gt;, and some
+      are starting</strong></del></span> <span class="inserted"><ins><em>allow 
them access</em></ins></span> to <span class="removed"><del><strong>realize 
that it is nasty.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    &lt;p&gt;This <span class="removed"><del><strong>article shows 
the</strong></del></span> <span class="inserted"><ins><em>involves an 
apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It snoops on users, too,</em></ins></span> as <span 
class="inserted"><ins><em>you must expect from nonfree
+    programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
+  &lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware that can</em></ins></span> snoop on <span 
class="removed"><del><strong>what radio</strong></del></span> <span 
class="inserted"><ins><em>a lot of
-    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>contact list,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app</strong></del></span> 
<span class="inserted"><ins><em>has</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> proprietary <span 
class="removed"><del><strong>apps for mobile devices report which other
+    apps</strong></del></span> <span class="inserted"><ins><em>phone 
app&lt;/a&gt; to be allowed into</em></ins></span>
+    the <span class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>event.&lt;/p&gt;
+
+    &lt;p&gt;This app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>at least is visible</strong></del></span> <span 
class="inserted"><ins><em>can snoop on a lot of
+    sensitive data, including user's location</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>picture you 
take according</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily be
-    traced back</em></ins></span> to <span class="inserted"><ins><em>the 
woman</em></ins></span> who
-      <span class="removed"><del><strong>is in</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access</strong></del></span> <span class="inserted"><ins><em>has 
harmful implications for women's rights</em></ins></span> to <span 
class="removed"><del><strong>some
-      known-faces database, which means the pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>equal employment
-    and freedom</em></ins></span> to <span class="removed"><del><strong>be
-      sent across the wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>make 
their own pregnancy choices. Don't use
-    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
-    free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>same 
thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>you is 
available from</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>some
-      are starting to realize that it is nasty.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
 
-      &lt;p&gt;This article shows the</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>new one</em></ins></span> is <span 
class="removed"><del><strong>a typical example of</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on 
the user&lt;/a&gt;. This</strong></del></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily</em></ins></span> be <span 
class="removed"><del><strong>distracted by</strong></del></span>
+    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>app developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this</strong></del></span> <span 
class="inserted"><ins><em>women's rights to equal employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software</em></ins></span> app <span 
class="removed"><del><strong>because it asked</strong></del></span> <span 
class="inserted"><ins><em>that does more or less</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>same thing without
+    spying on you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>movements</em></ins></span> of <span 
class="inserted"><ins><em>Android phones and iPhones
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
     running Goggle apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>proprietary 
software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
-    apps the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>a way that at least is visible and
-    optional&lt;/a&gt;. Not as bad as what</strong></del></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>phone has to be responsible</em></ins></span> for 
<span class="removed"><del><strong>children don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>sending
-    the location data to Google.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree</em></ins></span> apps <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it</em></ins></span> on <span 
class="inserted"><ins><em>to user-installed apps that have access 
to</em></ins></span>
-    the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>network but no 
direct access</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
-    surveillance on which</em></ins></span> the <span 
class="removed"><del><strong>phone company, and perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
-      users to say &ldquo;I agree&rdquo;. That is</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>control.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it asked the user to
-      approve sending</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive</em></ins></span> personal data to <span 
class="removed"><del><strong>the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can 
use</em></ins></span> it <span class="removed"><del><strong>to other companies. 
 This shows the
-      weakness</strong></del></span>
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
+    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to
+      <span class="removed"><del><strong>approve</strong></del></span> <span 
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span 
class="removed"><del><strong>personal</strong></del></span>
+    <span class="inserted"><ins><em>the location</em></ins></span> data to 
<span class="inserted"><ins><em>Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>data, or pass</em></ins></span> it <span 
class="inserted"><ins><em>on</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have access to
+    the network but no direct access to the data.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>results in massive
+    surveillance on which</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app</strong></del></span> <span class="inserted"><ins><em>24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;</em></ins></span>
+    send <span class="inserted"><ins><em>sensitive personal data to third 
parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
-      app send</strong></del></span> <span 
class="inserted"><ins><em>understand. In</em></ins></span> any <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>case,
+    lengthy terms of service that are difficult to understand. 
In</em></ins></span> any <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>case,
     &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
       app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -1351,14 +1373,15 @@
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
     <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use</em></ins></span> and <span 
class="removed"><del><strong>i-Que</strong></del></span>
     <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%)</em></ins></span> 
transmit <span class="inserted"><ins><em>the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
+    78,000 have been analyzed, of which 24,000 (31%)</em></ins></span> 
transmit 
+      <span class="removed"><del><strong>&lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
       a speech recognition company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers to listen in on a child's speech,</strong></del></span> 
<span class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="removed"><del><strong>even speak
+      can remotely control</strong></del></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>listen in on a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
       into the toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1413,118 +1436,75 @@
     
     &lt;p&gt;Following this lawsuit,
       &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total</strong></del></span> <span 
class="inserted"><ins><em>interface</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>most of them was designed</em></ins></span> to <span 
class="removed"><del><strong>the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span class="inserted"><ins><em>make uninstallation
+       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>interface of most of them was 
designed</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="inserted"><ins><em>potential risk because
-    there is no easy</em></ins></span> way <span 
class="removed"><del><strong>to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>of knowing what they really do.&lt;/p&gt;
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
+    there is no easy way</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen to these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>150 most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>150 most popular
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; 
due</em></ins></span> to <span class="removed"><del><strong>place new items on 
top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>DNS leaks. In
-    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>their
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users. Other 
technical flaws were
-    found as well.&lt;/p&gt;
-
-    &lt;p&gt;Moreover, a previous investigation had found</em></ins></span> 
that <span class="inserted"><ins><em>&lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>not 
really
-clean since</strong></del></span> <span class="inserted"><ins><em>unfortunate 
that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    potentially also be used to spy on users. Other technical flaws 
were</em></ins></span>
+    found <span class="inserted"><ins><em>as well.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover,</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected by</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
 
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span class="inserted"><ins><em>what 
it will do
-    with the data.&lt;/p&gt;
+    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>users 
of what it will do
+    with</em></ins></span> the <span class="removed"><del><strong>manufacturer 
and</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
 
-    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
+    &lt;p&gt;We think that lawsuit is about a side issue. 
What</em></ins></span> the <span class="removed"><del><strong>FBI could listen 
to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children</strong></del></span> <span 
class="inserted"><ins><em>company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>WeatherBug, are
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201812290"&gt;
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
     &lt;p&gt;Around 40% of gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
     report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span> <span 
class="inserted"><ins><em>send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data</em></ins></span> it <span 
class="inserted"><ins><em>obtains from the same machine via
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
     the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
@@ -1552,17 +1532,15 @@
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens</em></ins></span> through <span 
class="removed"><del><strong>Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the microphone&lt;/a&gt;.&lt;/p&gt;
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
     &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
     a recording. But we can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will 
benefit</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP 
phones:</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
@@ -2176,7 +2154,7 @@
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    used a firmware &ldquo;upgrade&rdquo; to</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2216,7 +2194,7 @@
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>place new items</strong></del></span> 
<span class="inserted"><ins><em>report what the
     user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2229,7 +2207,7 @@
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>other devices on the user's local 
network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
@@ -2245,15 +2223,17 @@
     Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
     and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-&lt;ul class="blurbs"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
     
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
@@ -2296,50 +2276,80 @@
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product 
as shipped doesn't act as</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote changes to the 
code could surely convert it
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
     recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on</em></ins></span> its <span 
class="removed"><del><strong>own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
+    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure to place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>statements 
about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but</em></ins></span> it <span class="removed"><del><strong>through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data 
to a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
@@ -3349,7 +3359,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/03 10:32:23 $
+$Date: 2019/10/19 10:01:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- proprietary-surveillance.it.po      3 Oct 2019 10:32:23 -0000       1.326
+++ proprietary-surveillance.it.po      19 Oct 2019 10:01:33 -0000      1.327
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1902,6 +1902,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary-surveillance.ja-diff.html       3 Oct 2019 10:32:23 -0000       
1.181
+++ proprietary-surveillance.ja-diff.html       19 Oct 2019 10:01:34 -0000      
1.182
@@ -1019,28 +1019,15 @@
 scans your mobile phone's photo collections for known faces&lt;/a&gt;,
       and suggests you to share the picture you take 
according</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across the wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
-      anymore,</strong></del></span> <span 
class="inserted"><ins><em>money.&lt;/p&gt;
+    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>more vicious.&lt;/p&gt;
+    makes it even more vicious.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>injustice of nonfree 
software. It may avoid
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015</strong></del></span> <span class="inserted"><ins><em>nasty thing, 
but cannot make</em></ins></span> it <span class="inserted"><ins><em>less 
nasty.&lt;/p&gt;
+    &lt;p&gt;This <span class="removed"><del><strong>spyware feature 
seems</strong></del></span> <span class="inserted"><ins><em>illustrates that 
making unauthorized copies of nonfree software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1050,6 +1037,37 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users</em></ins></span> to <span 
class="removed"><del><strong>require online</strong></del></span> <span 
class="inserted"><ins><em>grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;</em></ins></span>
+    access to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely to be
+      sent across</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
+    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>Android version was found</em></ins></span> to <span 
class="removed"><del><strong>Facebook's servers</strong></del></span> <span 
class="inserted"><ins><em>contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading</em></ins></span> and 
<span class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>article&lt;/a&gt; 
(partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based</strong></del></span> <span class="inserted"><ins><em>tests 
were only performed</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM</strong></del></span> 
<span class="inserted"><ins><em>the
+    Android version of the app,</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>that, 
according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909091"&gt;
     &lt;p&gt;The Facebook app</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
@@ -1074,18 +1092,17 @@
 
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
-    program</em></ins></span> is a <span class="removed"><del><strong>typical 
example</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of
-      <span class="removed"><del><strong>the attitude of 
the</strong></del></span> <span class="inserted"><ins><em>surveillance.  There 
is a</em></ins></span>
-    proprietary <span class="removed"><del><strong>software industry towards
-      those they have subjugated.&lt;/p&gt;
+    program</em></ins></span> is a <span class="removed"><del><strong>typical 
example</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of <span 
class="inserted"><ins><em>surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>list</em></ins></span> of <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they</strong></del></span> <span class="inserted"><ins><em>10,000 
or more people
+    who</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>program</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
-    apps</strong></del></span> <span class="inserted"><ins><em>adjusting a 
certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>list of all the 10,000 or more people
-    who have installed it&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+    apps the user</strong></del></span> <span 
class="inserted"><ins><em>installed it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With a free program there would not be a list of 
who</em></ins></span> has
     <span class="removed"><del><strong>installed.</strong></del></span> <span 
class="inserted"><ins><em>installed
@@ -1181,27 +1198,16 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>that does more 
or less the same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Goggle apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data</em></ins></span> for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span> <span 
class="inserted"><ins><em>that does more or less</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage to spy through it 
too&lt;/a&gt;.
+      Here's information</strong></del></span> <span 
class="inserted"><ins><em>same thing without
+    spying</em></ins></span> on <span class="inserted"><ins><em>you is 
available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
       More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
@@ -1216,68 +1222,113 @@
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued</strong></del></span> <span class="inserted"><ins><em>be 
responsible</em></ins></span> for <span class="removed"><del><strong>collecting 
lots</strong></del></span> <span class="inserted"><ins><em>sending
-    the location data to Google.&lt;/p&gt;
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is</em></ins></span> being <span 
class="removed"><del><strong>sued for collecting lots</strong></del></span> 
<span class="inserted"><ins><em>developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="removed"><del><strong>personal information about how
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
     people use it&lt;/a&gt;.&lt;/p&gt;
 
-       &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes the</strong></del></span> <span 
class="inserted"><ins><em>have access to sensitive</em></ins></span> data <span 
class="inserted"><ins><em>without
-    users' knowledge&lt;/a&gt;. These hidden apps</em></ins></span> may <span 
class="removed"><del><strong>be
-        true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>either call home with
-    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>on to user-installed apps that have access 
to</em></ins></span>
-    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access</em></ins></span> to 
<span class="removed"><del><strong>a
-        data broker,</strong></del></span> the <span 
class="removed"><del><strong>data broker can figure out 
who</strong></del></span> <span class="inserted"><ins><em>data. This results in 
massive
-    surveillance on which</em></ins></span> the user <span 
class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>has absolutely no control.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+       &lt;p&gt;The company's statement that it 
anonymizes</strong></del></span> <span class="inserted"><ins><em>Android phones 
and iPhones
+    running Goggle apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves</em></ins></span> the data <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to</em></ins></span> be
+        <span class="removed"><del><strong>true, but it doesn't really matter. 
If it sells</strong></del></span> <span class="inserted"><ins><em>responsible 
for sending</em></ins></span>
+    the <span class="inserted"><ins><em>location</em></ins></span> data to 
<span class="inserted"><ins><em>Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with</em></ins></span> a
+        <span class="removed"><del><strong>data broker, the data broker can 
figure out who the user is.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span> <span class="inserted"><ins><em>huge 
number of</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the data, or pass it</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps that have access 
to</em></ins></span>
+    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;The app reports the temperature</strong></del></span>
+      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to</em></ins></span> the 
<span class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
+    surveillance on which</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+  &lt;li id="M201903201"&gt;
     &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
     send sensitive personal data to third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it is <span class="removed"><del><strong>surrounded by</strong></del></span> 
<span class="inserted"><ins><em>buried in
     lengthy terms of service that are difficult to understand. In any case,
     &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
+    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="removed"><del><strong>person's
+      body),</strong></del></span> <span class="inserted"><ins><em>convenient 
proprietary
     library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
     sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
+    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
+      &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>personal
+    data they collected</em></ins></span> would <span 
class="removed"><del><strong>make statements about
+      their products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>go to Facebook as 
well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one</em></ins></span> can <span 
class="removed"><del><strong>check
+      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information</em></ins></span> on 
<span class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note that</strong></del></span> <span class="inserted"><ins><em>&lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>total) link this ID to hardware 
identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>in apparent 
violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
     that the policies of a development platform are ineffective at
@@ -1286,51 +1337,126 @@
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>Google 
Play had one or more malicious functionalities, such as</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. Furthermore,
-    the user interface of most of them was designed to make uninstallation
+    them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span class="inserted"><ins><em>them 
was designed to make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
+    &lt;p&gt;Users should of course uninstall these dangerous apps 
if</em></ins></span> they <span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>haven't yet, but they should also stay 
away from nonfree apps</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
+    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201902010"&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws were
+    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising&mdash;that could
+    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
     href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> is <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will do
+    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>will do
     with the data.&lt;/p&gt;
 
     &lt;p&gt;We think that lawsuit is about a side issue. What the company does
@@ -1339,110 +1465,204 @@
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="inserted"><ins><em>WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
   &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps &lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities in the app; others only say that the user is
+    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>many e-readers&mdash;not</strong></del></span> 
<span class="inserted"><ins><em>the app; others</em></ins></span> only <span 
class="inserted"><ins><em>say that</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
user <span class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>has a Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones</em></ins></span> of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>system has 
no authentication</strong></del></span> <span class="inserted"><ins><em>user's 
location even</em></ins></span> when
+    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
+    tracking, but most users will</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>tricked by</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
+    modem enables the phone company to track</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
-    a recording. But we can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;We expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But we can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Proprietary software</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less about sports, you will 
benefit</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span>
+    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
     of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
+    and collect</em></ins></span> information about <span 
class="removed"><del><strong>drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span> <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
+    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>this article,</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>not
+      really a matter of</strong></del></span> <span 
class="inserted"><ins><em>evidence that</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>apps generally work against
+    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
+    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done</strong></del></span> <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
+    Android</em></ins></span> by <span class="removed"><del><strong>malware. 
The other
+      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://replicant.us"&gt;switching</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,</em></ins></span>
+    and
+      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>proprietary apps by 
getting apps from the free software
+    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    the user</em></ins></span> if <span class="inserted"><ins><em>an app 
contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides the information to
-    companies&lt;/a&gt;.&lt;/p&gt;
+    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to <span 
class="removed"><del><strong>get the data
+      and hand it over, the state can store it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;
+    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>place new items on top 
under</strong></del></span> each <span class="removed"><del><strong>subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+    <span class="inserted"><ins><em>other but not</em></ins></span> to <span 
class="inserted"><ins><em>the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
+    &lt;p&gt;The moviepass app and dis-service</em></ins></span>
+    spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
+    follow</em></ins></span> a <span class="removed"><del><strong>joke: The 
other day</strong></del></span> <span class="inserted"><ins><em>user's 
movements around</em></ins></span> a <span class="removed"><del><strong>woman 
came up to me</strong></del></span> <span class="inserted"><ins><em>physical 
store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article misuses the words
+    uploads all phone numbers</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note</em></ins></span> that <span 
class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't 
expect</strong></del></span> this <span class="removed"><del><strong>has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;
+    referring</em></ins></span> to <span class="removed"><del><strong>get 
users' formal
+      consent before collecting personal data</strong></del></span> <span 
class="inserted"><ins><em>zero price.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
@@ -1458,22 +1678,24 @@
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
-    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</em></ins></span>
+    are <span class="removed"><del><strong>totally inadequate.
+      And</strong></del></span> <span 
class="inserted"><ins><em>malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
+    to inspect executable proprietary apps to see</em></ins></span> what <span 
class="removed"><del><strong>happens if</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
     the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
+    various ways. If it did</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>good job of 
this, it could more or less
+    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    Google to protect us. We must demand release of source 
code</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the
+    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
@@ -1490,8 +1712,11 @@
   &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by</em></ins></span> 
TV <span class="removed"><del><strong>will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws</strong></del></span>
+    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
@@ -1504,10 +1729,10 @@
     &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
+    the app</em></ins></span> would <span 
class="removed"><del><strong>say</strong></del></span> <span 
class="inserted"><ins><em>record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span 
class="inserted"><ins><em>this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
@@ -2147,177 +2372,40 @@
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The app was reporting the temperature</em></ins></span> of the 
vibrator minute by
-    minute (thus, indirectly, whether it <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> surrounded by a person's
-    body), <span class="removed"><del><strong>and</strong></del></span> <span 
class="inserted"><ins><em>as well as</em></ins></span> the vibration 
frequency.&lt;/p&gt;
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which users <span 
class="removed"><del><strong>can check
-      and change.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults.&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>could have 
checked
-    and changed.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is &lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>company that made</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>vibrator &lt;a
+    &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>data may be
-    true, but it doesn't really matter. If</em></ins></span> it <span 
class="inserted"><ins><em>had sold the data</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>a data
-    broker,</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out 
who</em></ins></span> the
-    user <span class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>pay a total 
of C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
-    customers.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>nonfree software are</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
-  effectively
-  anyone</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to</em></ins></span> access <span 
class="removed"><del><strong>its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>the data&lt;/a&gt; collected by the
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>do because</strong></del></span> <span 
class="inserted"><ins><em>these
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2325,15 +2413,12 @@
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+    company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen</em></ins></span> in <span class="inserted"><ins><em>on 
a child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span>
-    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
@@ -2352,10 +2437,8 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI</em></ins></span> is
-    <span class="removed"><del><strong>proprietary,</strong></del></span> 
<span class="inserted"><ins><em>in many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2369,182 +2452,121 @@
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when</em></ins></span> it <span class="removed"><del><strong>demands blind 
faith</strong></del></span> <span class="inserted"><ins><em>is not supposed to 
listen&lt;/a&gt;. Thus, when one of Google's
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
-    users were easily identified</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
+    users were easily identified from these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>these recordings.&lt;/p&gt;
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
+    way to see or control what it records or sends.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is</em></ins></span> no <span class="removed"><del><strong>one 
connects</strong></del></span>
-    <span class="inserted"><ins><em>way</em></ins></span> to <span 
class="inserted"><ins><em>see or control what it records or sends.&lt;/p&gt;
-
-    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
-    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
-    get commands that</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send to some Google 
service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more</em></ins></span> information 
<span class="removed"><del><strong>about drivers' movements&lt;/a&gt;,
-      which</strong></del></span> <span class="inserted"><ins><em>from users
-    than</em></ins></span> is <span class="inserted"><ins><em>necessary for 
correct functioning (time, location,
-    recordings</em></ins></span> made <span 
class="removed"><del><strong>available to car manufacturers, insurance 
companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really</strong></del></span> <span 
class="inserted"><ins><em>without</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>sends
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
     even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>invasion isn't 
done</strong></del></span> <span class="inserted"><ins><em>data remain on other 
servers&lt;/a&gt;, where they can be accessed</em></ins></span> by <span 
class="removed"><del><strong>malware. The</strong></del></span>
-    <span class="inserted"><ins><em>advertising companies and government 
agencies. In</em></ins></span> other
-      <span class="removed"><del><strong>cases mentioned</strong></del></span> 
<span class="inserted"><ins><em>words,
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices</em></ins></span> are <span class="removed"><del><strong>done 
by proprietary malware</strong></del></span> <span 
class="inserted"><ins><em>tethered to. Moreover, they are made available to
+    the devices are tethered to. Moreover, they are made available to
     Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
+    at home, not only in the present, but in the past (and, who knows,
     in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;).</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;.</em></ins></span> 
The <span class="removed"><del><strong>company says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>Google and Apple
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span> 
to <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since</em></ins></span> the <span 
class="inserted"><ins><em>client program is nonfree, and</em></ins></span> data 
<span class="inserted"><ins><em>processing is done
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how</em></ins></span> and <span class="removed"><del><strong>hand 
it over,</strong></del></span> <span class="inserted"><ins><em>where it's 
done&rdquo;), users have no way
-    to know what happens to</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>recordings 
unless human eavesdroppers &lt;a
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
+  &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to</em></ins></span> make sure 
<span class="removed"><del><strong>to place new items on top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>the user is still
-    paying for the subscription, and hasn't printed more pages 
than</em></ins></span> were <span class="removed"><del><strong>programmed to 
spy</strong></del></span>
-    <span class="inserted"><ins><em>paid for.&lt;/p&gt;
-
-    &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the user <span 
class="removed"><del><strong>watches &mdash; no exceptions!&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
-    restrictions</em></ins></span> in <span class="removed"><del><strong>TV 
Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further</strong></del></span> <span 
class="inserted"><ins><em>is still
+    paying for the subscription, and hasn't printed more 
pages</em></ins></span> than <span class="removed"><del><strong>other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be 
cheaper</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>some
+    specific cases, it spies</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>users, and 
involves totally unacceptable
+    restrictions</em></ins></span> in <span 
class="removed"><del><strong>detail</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
-before</strong></del></span> <span class="inserted"><ins><em>security of 
an</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>device,
-    and</em></ins></span> &lt;a <span class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon 
device,</em></ins></span>
+    and 
+      <span class="removed"><del><strong>link</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+    &lt;p&gt;It was very difficult for</em></ins></span> them <span 
class="removed"><del><strong>your IP address&lt;/a&gt; so</strong></del></span> 
<span class="inserted"><ins><em>to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>advertisers can 
track</strong></del></span> <span class="inserted"><ins><em>country,
+    do</em></ins></span> you 
+      <span class="removed"><del><strong>across devices.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
-    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>think Amazon would have the moral 
fiber</em></ins></span> to <span class="removed"><del><strong>turn this 
off,</strong></del></span> <span class="inserted"><ins><em>say no?&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
-
-    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
+    &lt;p&gt;These crackers are probably hackers too,</em></ins></span> but 
<span class="removed"><del><strong>having it enabled</strong></del></span> 
<span class="inserted"><ins><em>please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+  &lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV manufacturers in spying</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that 
snoops</em></ins></span> on 
-      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+    offers a gratis electronic toothbrush that snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>default
+      is an injustice already.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>products are 
designed &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone</em></ins></span> in <span 
class="removed"><del><strong>detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    listen</em></ins></span> to <span class="inserted"><ins><em>everyone 
in</em></ins></span> the <span class="removed"><del><strong>600 millions social 
media profiles</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> can <span 
class="removed"><del><strong>track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
-    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
+    a device that</em></ins></span> can <span 
class="removed"><del><strong>now</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+  &lt;li id="M201407170"&gt;
     &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
       advertisement with online purchases&lt;/a&gt;, exposing all users to
       new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
@@ -3196,7 +3218,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/03 10:32:23 $
+$Date: 2019/10/19 10:01:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- proprietary-surveillance.ja.po      3 Oct 2019 10:32:23 -0000       1.307
+++ proprietary-surveillance.ja.po      19 Oct 2019 10:01:34 -0000      1.308
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1426,6 +1426,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.247
retrieving revision 1.248
diff -u -b -r1.247 -r1.248
--- proprietary-surveillance.pot        3 Oct 2019 10:32:23 -0000       1.247
+++ proprietary-surveillance.pot        19 Oct 2019 10:01:34 -0000      1.248
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1036,6 +1036,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a "
+"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\";>
 "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a "
+"back-door allowing developers to run any code they wish in the users' phone, "
+"as &ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory "
+"at some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a "
+"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\";>
 "
+"Washington Post version of the article</a> (partly obfuscated, but readable "
+"after copy-pasting in a text editor) includes a clarification saying that "
+"the tests were only performed on the Android version of the app, and that, "
+"according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance "
+"could not be conducted on Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Facebook app <a "
 
"href=\"https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/\";>
 "
 "tracks users even when it is turned off</a>, after tricking them into giving "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.573
retrieving revision 1.574
diff -u -b -r1.573 -r1.574
--- proprietary-surveillance.ru.po      3 Oct 2019 11:00:59 -0000       1.573
+++ proprietary-surveillance.ru.po      19 Oct 2019 10:01:34 -0000      1.574
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1462,6 +1463,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary.de-diff.html    16 Oct 2019 07:30:05 -0000      1.132
+++ proprietary.de-diff.html    19 Oct 2019 10:01:34 -0000      1.133
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -46,13 +46,13 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -85,8 +85,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, <span 
class="removed"><del><strong>2017,</strong></del></span> <span 
class="inserted"><ins><em>2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 450 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 500 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -131,16 +131,16 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -188,6 +188,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910070"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"&gt;
@@ -231,14 +251,6 @@
     run nonfree apps. They can never be completely sure that a nonfree
     app is safe.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app &lt;a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -300,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary.de.po   16 Oct 2019 07:30:05 -0000      1.174
+++ proprietary.de.po   19 Oct 2019 10:01:34 -0000      1.175
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -98,19 +98,19 @@
 "übers Ohr gehauen zu werden&#160;…"
 
 #. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
+# | directory list around [-3-]{+4+}00 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2017, the files in this directory list around 300 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
 "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt sind "
@@ -455,6 +455,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-";
 "kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
 "government. When the region is set to Hong Kong, this flag is not visible in "
@@ -506,15 +531,6 @@
 "nonfree apps. They can never be completely sure that a nonfree app is safe."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.es.po   16 Oct 2019 11:13:06 -0000      1.230
+++ proprietary.es.po   19 Oct 2019 10:01:34 -0000      1.231
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -88,10 +89,19 @@
 "de ser engañado."
 
 #. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "Hasta abril de 2019, las páginas de este directorio ofrecían una lista de "
 "alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 450 "
@@ -312,6 +322,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-";
 "kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
 "government. When the region is set to Hong Kong, this flag is not visible in "
@@ -392,20 +427,6 @@
 "ejecutan aplicaciones que no son libres. Nunca pueden tener la certeza de "
 "que una aplicación privativa sea segura."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-"La aplicación de Facebook <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\">rastrea a los usuarios incluso cuando está cerrada</a>, "
-"tras haberles embaucado para que den a la aplicación amplios permisos a fin "
-"de utilizar una de sus funcionalidades."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -483,6 +504,19 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> tracks users even when it is turned off</a>, after "
+#~ "tricking them into giving the app broad permissions in order to use one "
+#~ "of its functionalities."
+#~ msgstr ""
+#~ "La aplicación de Facebook <a href=\"https://eu.usatoday.com/story/tech/";
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\">rastrea a los usuarios incluso cuando está cerrada</"
+#~ "a>, tras haberles embaucado para que den a la aplicación amplios permisos 
"
+#~ "a fin de utilizar una de sus funcionalidades."
+
+#~ msgid ""
 #~ "The recent versions of Microsoft Office require the user to <a href="
 #~ "\"https://products.office.com/en-us/microsoft-office-for-home-and-school-";
 #~ "faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-"

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary.fr.po   16 Oct 2019 10:47:19 -0000      1.278
+++ proprietary.fr.po   19 Oct 2019 10:01:34 -0000      1.279
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2019-10-16 12:46+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -86,10 +87,19 @@
 "typiquement un moyen de mal se conduire."
 
 #. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "En avril 2019, les pages de ce répertoire dénombraient à peu près 400 cas 
de "
 "fonctionnalités malveillante (appuyés par plus de 450 références), mais 
il y "
@@ -308,6 +318,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-";
 "kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
 "government. When the region is set to Hong Kong, this flag is not visible in "
@@ -387,20 +422,6 @@
 "appli non libre. Ils ne peuvent jamais être complètement sûrs qu'elle est "
 "sans danger."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-"L'appli de Facebook <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\">piste les utilisateurs même quand elle n'est pas 
activée</"
-"a>, après les avoir incités à lui donner des permissions très étendues 
pour "
-"utiliser une de ses fonctionnalités"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,3 +494,16 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> tracks users even when it is turned off</a>, after "
+#~ "tricking them into giving the app broad permissions in order to use one "
+#~ "of its functionalities."
+#~ msgstr ""
+#~ "L'appli de Facebook <a href=\"https://eu.usatoday.com/story/tech/";
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\">piste les utilisateurs même quand elle n'est pas "
+#~ "activée</a>, après les avoir incités à lui donner des permissions 
très "
+#~ "étendues pour utiliser une de ses fonctionnalités"

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary.it-diff.html    16 Oct 2019 07:30:05 -0000      1.144
+++ proprietary.it-diff.html    19 Oct 2019 10:01:35 -0000      1.145
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -85,8 +85,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, <span 
class="removed"><del><strong>2017,</strong></del></span> <span 
class="inserted"><ins><em>2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 450 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 500 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -187,6 +187,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910070"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"&gt;
@@ -230,14 +250,6 @@
     run nonfree apps. They can never be completely sure that a nonfree
     app is safe.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app &lt;a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -299,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary.it.po   16 Oct 2019 07:30:05 -0000      1.183
+++ proprietary.it.po   19 Oct 2019 10:01:35 -0000      1.184
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -94,19 +94,19 @@
 "norma. Il software proprietario moderno è tipicamente una fregatura."
 
 #. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
+# | directory list around [-3-]{+4+}00 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2017, the files in this directory list around 300 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
 "ma sicuramente ce ne sono altre migliaia che ancora non conosciamo."
@@ -459,6 +459,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-";
 "kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
 "government. When the region is set to Hong Kong, this flag is not visible in "
@@ -510,15 +535,6 @@
 "nonfree apps. They can never be completely sure that a nonfree app is safe."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary.ja-diff.html    16 Oct 2019 07:30:05 -0000      1.147
+++ proprietary.ja-diff.html    19 Oct 2019 10:01:35 -0000      1.148
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -81,8 +81,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of <span class="removed"><del><strong>January, 
2017,</strong></del></span> <span class="inserted"><ins><em>April, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>260</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 450 references to
+&lt;p&gt;As of <span class="removed"><del><strong>January, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>260</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 500 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -129,11 +129,11 @@
   &lt;/td&gt;
   &lt;td&gt;
    &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
@@ -161,10 +161,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -185,6 +185,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910070"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"&gt;
@@ -228,14 +248,6 @@
     run nonfree apps. They can never be completely sure that a nonfree
     app is safe.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app &lt;a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -297,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.ja.po   16 Oct 2019 07:30:05 -0000      1.167
+++ proprietary.ja.po   19 Oct 2019 10:01:35 -0000      1.168
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -91,9 +91,9 @@
 #| "instances of malicious functionalities, but there are surely thousands "
 #| "more we don't know about."
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 
"2017年1月時点で、ここには、約260の異なる悪意のある機能の実例が掲載されていま"
 
"すが、確実にわたしたちが知らない何千もの例があるでしょう。"
@@ -319,6 +319,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-";
 "kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
 "government. When the region is set to Hong Kong, this flag is not visible in "
@@ -370,15 +395,6 @@
 "nonfree apps. They can never be completely sure that a nonfree app is safe."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.nl-diff.html    16 Oct 2019 07:30:05 -0000      1.145
+++ proprietary.nl-diff.html    19 Oct 2019 10:01:35 -0000      1.146
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -85,8 +85,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, <span 
class="removed"><del><strong>2017,</strong></del></span> <span 
class="inserted"><ins><em>2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 450 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 500 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -187,6 +187,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910070"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"&gt;
@@ -230,14 +250,6 @@
     run nonfree apps. They can never be completely sure that a nonfree
     app is safe.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app &lt;a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -299,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- proprietary.nl.po   16 Oct 2019 07:30:05 -0000      1.157
+++ proprietary.nl.po   19 Oct 2019 10:01:35 -0000      1.158
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -94,19 +94,19 @@
 "je meestal belazerd."
 
 #. type: Content of: <p>
-# | As of April, 2019, the [-files-] {+pages+} in this directory list around
-# | 400 instances of malicious [-functionalities,-] {+functionalities (with
-# | more than 450 references to back them up),+} but there are surely
-# | thousands more we don't know about.
+# | As of [-April,-] {+October,+} 2019, the [-files-] {+pages+} in this
+# | directory list around 400 instances of malicious [-functionalities,-]
+# | {+functionalities (with more than 500 references to back them up),+} but
+# | there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2019, the files in this directory list around 400 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
 "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
@@ -361,6 +361,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-";
 "kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
 "government. When the region is set to Hong Kong, this flag is not visible in "
@@ -412,15 +437,6 @@
 "nonfree apps. They can never be completely sure that a nonfree app is safe."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.pl-diff.html    16 Oct 2019 07:30:05 -0000      1.162
+++ proprietary.pl-diff.html    19 Oct 2019 10:01:35 -0000      1.163
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 450 
references to
+&lt;p&gt;As of October, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 500 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -185,6 +185,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;(1) The &lt;a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple, &ldquo;this
+    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
+    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910070"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"&gt;
@@ -228,14 +248,6 @@
     run nonfree apps. They can never be completely sure that a nonfree
     app is safe.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app &lt;a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -297,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary.pl.po   16 Oct 2019 07:30:05 -0000      1.150
+++ proprietary.pl.po   19 Oct 2019 10:01:35 -0000      1.151
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -135,9 +135,9 @@
 
 #. type: Content of: <p>
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 
 #. type: Content of: <table><tr><th>
@@ -540,6 +540,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-";
 "kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
 "government. When the region is set to Hong Kong, this flag is not visible in "
@@ -591,15 +616,6 @@
 "nonfree apps. They can never be completely sure that a nonfree app is safe."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary.pot     16 Oct 2019 07:30:05 -0000      1.147
+++ proprietary.pot     19 Oct 2019 10:01:35 -0000      1.148
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -70,9 +70,9 @@
 
 #. type: Content of: <p>
 msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 
 #. type: Content of: <table><tr><th>
@@ -257,6 +257,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a "
+"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\";>
 "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a "
+"back-door allowing developers to run any code they wish in the users' phone, "
+"as &ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory "
+"at some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a "
+"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\";>
 "
+"Washington Post version of the article</a> (partly obfuscated, but readable "
+"after copy-pasting in a text editor) includes a clarification saying that "
+"the tests were only performed on the Android version of the app, and that, "
+"according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance "
+"could not be conducted on Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple <a "
 
"href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html\";>
 "
 "censors the Taiwan flag in iOS</a> on behalf of the Chinese government. When "
@@ -309,14 +332,6 @@
 "nonfree apps. They can never be completely sure that a nonfree app is safe."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a "
-"href=\"https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/\";>
 "
-"tracks users even when it is turned off</a>, after tricking them into giving "
-"the app broad permissions in order to use one of its functionalities."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary.pt-br.po        17 Oct 2019 05:59:32 -0000      1.240
+++ proprietary.pt-br.po        19 Oct 2019 10:01:35 -0000      1.241
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2019-10-17 02:11-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -84,10 +85,15 @@
 "de ser mal."
 
 #. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "Até abril de 2019, as páginas neste diretório listam quase 400 exemplos de 
"
 "funcionalidades maliciosas (com mais de 450 referências para confirmá-las), 
"
@@ -305,6 +311,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-";
 "kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
 "government. When the region is set to Hong Kong, this flag is not visible in "
@@ -384,20 +415,6 @@
 "aplicativos não livres. Eles nunca podem ter certeza absoluta de que um "
 "aplicativo não livre é seguro."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-"O aplicativo do Facebook <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> rastreia os usuários mesmo quando está desativado</a>, "
-"depois de induzi-los a conceder amplas permissões ao aplicativo para usar "
-"uma de suas funcionalidades."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,6 +490,19 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> tracks users even when it is turned off</a>, after "
+#~ "tricking them into giving the app broad permissions in order to use one "
+#~ "of its functionalities."
+#~ msgstr ""
+#~ "O aplicativo do Facebook <a href=\"https://eu.usatoday.com/story/tech/";
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> rastreia os usuários mesmo quando está desativado</"
+#~ "a>, depois de induzi-los a conceder amplas permissões ao aplicativo para "
+#~ "usar uma de suas funcionalidades."
+
+#~ msgid ""
 #~ "The recent versions of Microsoft Office require the user to <a href="
 #~ "\"https://products.office.com/en-us/microsoft-office-for-home-and-school-";
 #~ "faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-"

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary.ru.po   16 Oct 2019 14:28:34 -0000      1.311
+++ proprietary.ru.po   19 Oct 2019 10:01:36 -0000      1.312
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -88,10 +89,19 @@
 "способ дать себя одурачить."
 
 #. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
 msgstr ""
 "На апрель 2019&nbsp;года на страницах этого 
каталога перечислено около 400 "
 "примеров вредоносных функций (и более 450 
ссылок, подкрепляющих их), но "
@@ -311,6 +321,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, &ldquo;this "
+"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
+"Apple's operating system.&rdquo;"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-";
 "kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
 "government. When the region is set to Hong Kong, this flag is not visible in "
@@ -390,20 +425,6 @@
 "работают с несвободными приложениями. Они 
никогда не могут быть полностью "
 "уверенными, что несвободное приложение 
безопасно."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-"Приложение Facebook <a href=\"https://eu.usatoday.com/story/tech/";
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> отслеживает пользователей, 
даже когда оно выключено</a>, "
-"после того как обманом вынудит 
предоставить приложению широкие права "
-"доступа, чтобы использовать одну из его 
функций."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -482,6 +503,19 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> tracks users even when it is turned off</a>, after "
+#~ "tricking them into giving the app broad permissions in order to use one "
+#~ "of its functionalities."
+#~ msgstr ""
+#~ "Приложение Facebook <a 
href=\"https://eu.usatoday.com/story/tech/";
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> отслеживает пользователей, 
даже когда оно выключено</"
+#~ "a>, после того как обманом вынудит 
предоставить приложению широкие права "
+#~ "доступа, чтобы использовать одну из его 
функций."
+
+#~ msgid ""
 #~ "The recent versions of Microsoft Office require the user to <a href="
 #~ "\"https://products.office.com/en-us/microsoft-office-for-home-and-school-";
 #~ "faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-"

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.zh-tw-diff.html 16 Oct 2019 07:30:05 -0000      1.124
+++ proprietary.zh-tw-diff.html 19 Oct 2019 10:01:36 -0000      1.125
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -46,13 +46,13 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -85,8 +85,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, <span 
class="removed"><del><strong>2017,</strong></del></span> <span 
class="inserted"><ins><em>2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 450 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 500 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -131,16 +131,16 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/