www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sat, 19 Oct 2019 06:32:24 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/10/19 06:32:24

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.ru.po nl.po 
                         pl.po pot proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.es.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.480&r2=1.481
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.308&r2=1.309
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.574&r2=1.575
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.241&r2=1.242
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.312&r2=1.313
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.150&r2=1.151

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- de.po       19 Oct 2019 10:01:29 -0000      1.150
+++ de.po       19 Oct 2019 10:32:21 -0000      1.151
@@ -1862,14 +1862,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -10154,19 +10154,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- es.po       19 Oct 2019 10:01:30 -0000      1.211
+++ es.po       19 Oct 2019 10:32:21 -0000      1.212
@@ -1754,14 +1754,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -9591,19 +9591,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- fr.po       19 Oct 2019 10:01:30 -0000      1.260
+++ fr.po       19 Oct 2019 10:32:22 -0000      1.261
@@ -1647,14 +1647,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -8800,19 +8800,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- it.po       19 Oct 2019 10:01:30 -0000      1.150
+++ it.po       19 Oct 2019 10:32:22 -0000      1.151
@@ -1843,14 +1843,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -9494,19 +9494,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- ja.po       19 Oct 2019 10:01:30 -0000      1.157
+++ ja.po       19 Oct 2019 10:32:22 -0000      1.158
@@ -1429,14 +1429,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -7331,19 +7331,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "

Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- malware-apple.de-diff.html  19 Oct 2019 10:01:30 -0000      1.50
+++ malware-apple.de-diff.html  19 Oct 2019 10:32:22 -0000      1.51
@@ -885,22 +885,22 @@
 programs.&lt;/p&gt;
 
 &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app</em></ins></span> is <span class="removed"><del><strong>an article 
about the</strong></del></span> <span class="inserted"><ins><em>mandatory at 
some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The</em></ins></span> &lt;a
+    &lt;p&gt;Note: The</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
 code signing&lt;/a&gt; that</strong></del></span>
      <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>iThings use to lock up</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that</em></ins></span> the <span 
class="removed"><del><strong>user.&lt;/p&gt;
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>iThings use to lock up</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that</em></ins></span> the <span 
class="removed"><del><strong>user.&lt;/p&gt;
 
 &lt;p&gt;Curiously, Apple is beginning to allow limited passage 
through</strong></del></span> <span class="inserted"><ins><em>tests were only 
performed on</em></ins></span> the
-<span class="removed"><del><strong>walls</strong></del></span>
-    <span class="inserted"><ins><em>Android version</em></ins></span> of the 
<span class="removed"><del><strong>iThing jail: users can now 
install</strong></del></span> <span class="inserted"><ins><em>app, and that, 
according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+<span class="removed"><del><strong>walls</strong></del></span> <span 
class="inserted"><ins><em>Android version</em></ins></span>
+    of the <span class="removed"><del><strong>iThing jail: users can now 
install</strong></del></span> <span class="inserted"><ins><em>app, and that, 
according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905280"&gt;
@@ -1278,7 +1278,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:30 $
+$Date: 2019/10/19 10:32:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- malware-apple.de.po 19 Oct 2019 10:01:30 -0000      1.145
+++ malware-apple.de.po 19 Oct 2019 10:32:22 -0000      1.146
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1228,14 +1228,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- malware-apple.es.po 19 Oct 2019 10:01:30 -0000      1.168
+++ malware-apple.es.po 19 Oct 2019 10:32:22 -0000      1.169
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -1089,14 +1089,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- malware-apple.fr.po 19 Oct 2019 10:01:30 -0000      1.175
+++ malware-apple.fr.po 19 Oct 2019 10:32:22 -0000      1.176
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2019-10-16 12:46+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -1091,14 +1091,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-apple.it-diff.html  19 Oct 2019 10:01:30 -0000      1.58
+++ malware-apple.it-diff.html  19 Oct 2019 10:32:22 -0000      1.59
@@ -697,18 +697,18 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="inserted"><ins><em>the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
+    phone, as &ldquo;superusers.&rdquo; Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
 not involve making</strong></del></span>
     <span class="inserted"><ins><em>app is mandatory at some 
workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>program that runs</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way that hurts the user.
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>program that runs</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way that hurts the user.
 But they are</strong></del></span> <span class="inserted"><ins><em>text 
editor) includes</em></ins></span> a <span class="removed"><del><strong>lot 
like malware, since they are technical Apple
-actions</strong></del></span>
-    <span class="inserted"><ins><em>clarification saying</em></ins></span> 
that <span class="removed"><del><strong>harm to</strong></del></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the
-    Android version</em></ins></span> of <span 
class="removed"><del><strong>specific Apple software.&lt;/p&gt;
+actions</strong></del></span> <span class="inserted"><ins><em>clarification
+    saying</em></ins></span> that <span class="removed"><del><strong>harm 
to</strong></del></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the Android 
version</em></ins></span>
+    of <span class="removed"><del><strong>specific Apple software.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
@@ -716,9 +716,9 @@
     model iThings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's</strong></del></span> the <span 
class="removed"><del><strong>nature</strong></del></span> <span 
class="inserted"><ins><em>app, and that, according to Apple, &ldquo;this
-    kind</em></ins></span> of <span class="removed"><del><strong>proprietary 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lsquo;superuser&rsquo; surveillance could not be 
conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+    that's</strong></del></span> the <span 
class="removed"><del><strong>nature</strong></del></span> <span 
class="inserted"><ins><em>app, and that, according to Apple, &ldquo;this 
kind</em></ins></span> of <span class="removed"><del><strong>proprietary 
software.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>&lsquo;superuser&rsquo; surveillance could 
not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
@@ -1154,7 +1154,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:30 $
+$Date: 2019/10/19 10:32:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- malware-apple.it.po 19 Oct 2019 10:01:30 -0000      1.139
+++ malware-apple.it.po 19 Oct 2019 10:32:22 -0000      1.140
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1252,14 +1252,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-apple.ja-diff.html  19 Oct 2019 10:01:30 -0000      1.71
+++ malware-apple.ja-diff.html  19 Oct 2019 10:32:22 -0000      1.72
@@ -688,20 +688,20 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="inserted"><ins><em>the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
+    phone, as &ldquo;superusers.&rdquo; Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
 not involve making</strong></del></span>
     <span class="inserted"><ins><em>app is mandatory at some 
workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>program that runs</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a
-    clarification saying</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> the <span 
class="removed"><del><strong>user.
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>program that runs</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a clarification
+    saying</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> the <span 
class="removed"><del><strong>user.
 But they are a lot like malware, since they are technical Apple
-actions</strong></del></span> <span class="inserted"><ins><em>tests were only 
performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+actions</strong></del></span> <span class="inserted"><ins><em>tests were only 
performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905280"&gt;
@@ -1118,7 +1118,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:30 $
+$Date: 2019/10/19 10:32:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- malware-apple.ja.po 19 Oct 2019 10:01:31 -0000      1.122
+++ malware-apple.ja.po 19 Oct 2019 10:32:22 -0000      1.123
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -936,14 +936,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-apple.nl-diff.html  19 Oct 2019 10:01:31 -0000      1.76
+++ malware-apple.nl-diff.html  19 Oct 2019 10:32:22 -0000      1.77
@@ -688,20 +688,20 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="inserted"><ins><em>the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
+    phone, as &ldquo;superusers.&rdquo; Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
 not involve making</strong></del></span>
     <span class="inserted"><ins><em>app is mandatory at some 
workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>program that runs</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a
-    clarification saying</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> the <span 
class="removed"><del><strong>user.
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>program that runs</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a clarification
+    saying</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> the <span 
class="removed"><del><strong>user.
 But they are a lot like malware, since they are technical Apple
-actions</strong></del></span> <span class="inserted"><ins><em>tests were only 
performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+actions</strong></del></span> <span class="inserted"><ins><em>tests were only 
performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905280"&gt;
@@ -1118,7 +1118,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:31 $
+$Date: 2019/10/19 10:32:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- malware-apple.nl.po 19 Oct 2019 10:01:31 -0000      1.77
+++ malware-apple.nl.po 19 Oct 2019 10:32:22 -0000      1.78
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -912,14 +912,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- malware-apple.pot   19 Oct 2019 10:01:31 -0000      1.87
+++ malware-apple.pot   19 Oct 2019 10:32:22 -0000      1.88
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -745,13 +745,13 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a "
 "back-door allowing developers to run any code they wish in the users' phone, "
-"as &ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory "
-"at some workplaces."
+"as &ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
+"some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a "
+"Note: The <a "
 
"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\";>
 "
 "Washington Post version of the article</a> (partly obfuscated, but readable "
 "after copy-pasting in a text editor) includes a clarification saying that "

Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- malware-apple.ru.po 19 Oct 2019 10:01:31 -0000      1.226
+++ malware-apple.ru.po 19 Oct 2019 10:32:22 -0000      1.227
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2019-01-29 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -1081,14 +1081,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- nl.po       19 Oct 2019 10:01:31 -0000      1.151
+++ nl.po       19 Oct 2019 10:32:22 -0000      1.152
@@ -1540,14 +1540,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -6759,19 +6759,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- pl.po       19 Oct 2019 10:01:31 -0000      1.150
+++ pl.po       19 Oct 2019 10:32:22 -0000      1.151
@@ -1260,14 +1260,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -6062,19 +6062,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- pot 19 Oct 2019 10:01:31 -0000      1.149
+++ pot 19 Oct 2019 10:32:22 -0000      1.150
@@ -1117,14 +1117,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -5823,19 +5823,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "

Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-back-doors.de-diff.html 19 Oct 2019 10:01:31 -0000      1.33
+++ proprietary-back-doors.de-diff.html 19 Oct 2019 10:32:22 -0000      1.34
@@ -445,9 +445,8 @@
     
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
     that allows Apple to</em></ins></span> remotely <span 
class="removed"><del><strong>deleting apps&lt;/a&gt;.&lt;/p&gt;
     &lt;p&gt;You might well decide</strong></del></span> <span 
class="inserted"><ins><em>delete apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for 
Apple</em></ins></span> to <span class="removed"><del><strong>let a security 
service that you</strong></del></span> <span class="inserted"><ins><em>have
-    this power because of course we can</em></ins></span> trust
-      <span class="removed"><del><strong>remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for 
Apple</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>have
+    this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -459,44 +458,25 @@
     &lt;p&gt;The Chinese Communist Party's &lt;a
     href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
     &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt; was found to contain 
&lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    a back-door allowing developers to run any code they wish&lt;/a&gt; in the
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;</em></ins></span>
+    a <span class="removed"><del><strong>security 
service</strong></del></span> <span class="inserted"><ins><em>back-door 
allowing developers to run any code they wish&lt;/a&gt; in the
     users' phone, as &ldquo;superusers.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
     Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
     readable after copy-pasting in a text editor) includes a clarification
-    saying</em></ins></span> that <span class="inserted"><ins><em>the tests 
were only performed on the Android version
+    saying</em></ins></span> that <span class="removed"><del><strong>you trust
+      remotely &lt;em&gt;deactivate&lt;/em&gt; programs</strong></del></span> 
<span class="inserted"><ins><em>the tests were only performed on the Android 
version
     of the app, and that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant</em></ins></span> it 
<span class="removed"><del><strong>considers malicious.
-      But there</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;(1) The &lt;a
-     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201908220"&gt;
     &lt;p&gt;ChromeBooks are programmed for obsolescence:
-    ChromeOS has a universal back door that</em></ins></span> is <span 
class="inserted"><ins><em>used for updates and &lt;a
+    ChromeOS has a universal back door</em></ins></span> that <span 
class="removed"><del><strong>it considers malicious.
+      But there</strong></del></span> is <span class="inserted"><ins><em>used 
for updates and &lt;a
     
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
     ceases to operate at a predefined date&lt;/a&gt;. From then on, there
     appears to be</em></ins></span> no <span 
class="removed"><del><strong>excuse</strong></del></span> <span 
class="inserted"><ins><em>support whatsoever</em></ins></span> for <span 
class="removed"><del><strong>&lt;em&gt;deleting&lt;/em&gt;</strong></del></span>
 the <span class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;
@@ -882,7 +862,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:31 $
+$Date: 2019/10/19 10:32:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary-back-doors.de.po        19 Oct 2019 10:01:31 -0000      1.132
+++ proprietary-back-doors.de.po        19 Oct 2019 10:32:22 -0000      1.133
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -784,31 +784,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-back-doors.es.po        19 Oct 2019 10:01:32 -0000      1.24
+++ proprietary-back-doors.es.po        19 Oct 2019 10:32:22 -0000      1.25
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2019-09-12 12:36+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -682,31 +682,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary-back-doors.fr.po        19 Oct 2019 10:01:32 -0000      1.143
+++ proprietary-back-doors.fr.po        19 Oct 2019 10:32:22 -0000      1.144
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2019-10-04 10:51+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -690,31 +690,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary-back-doors.it-diff.html 19 Oct 2019 10:01:32 -0000      1.60
+++ proprietary-back-doors.it-diff.html 19 Oct 2019 10:32:22 -0000      1.61
@@ -377,7 +377,7 @@
     &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
   
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable modem has 
a</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable 
modem</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
     &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
@@ -395,7 +395,12 @@
   &lt;li id="M201103070"&gt;
     &lt;p&gt;In Android, &lt;a
     
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google has a back door to remotely delete apps&lt;/a&gt;. (It was in a
+    Google</em></ins></span> has a
+  <span class="removed"><del><strong>&lt;a 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span class="inserted"><ins><em>back door to 
remotely delete apps&lt;/a&gt;. (It was in a
     program called GTalkService, which seems since then to have been
     merged into Google Play.)&lt;/p&gt;
 
@@ -409,15 +414,22 @@
     malicious so far, the point is that nobody should have such power,
     which could also be used maliciously.  You might well decide to
     let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for allowing it to
-    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
-    who (if anyone) to trust in this way.&lt;/p&gt;
-  &lt;/li&gt;
+    it considers malicious.  But there is no excuse for allowing 
it</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span>
+    <span 
class="inserted"><ins><em>&lt;em&gt;delete&lt;/em&gt;</em></ins></span> the 
<span class="removed"><del><strong>engine&lt;/a&gt;
+     remotely.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>programs, and you should have the right to decide
+    who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local</strong></del></span>
 
-  &lt;li id="M200808110"&gt;
-    &lt;p&gt;The iPhone has a back door &lt;a
-    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-    that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
+  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;
+    &lt;p&gt;The iPhone has a</em></ins></span> back door <span 
class="removed"><del><strong>for 4 years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</em></ins></span>
+    that <span class="inserted"><ins><em>allows Apple to remotely delete 
apps&lt;/a&gt; which Apple considers
     &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
     this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
@@ -428,59 +440,28 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201910130.1"&gt;
-    &lt;p&gt;The Chinese Communist Party's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
-    &ldquo;Study</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with</strong></del></span> 
<span class="inserted"><ins><em>Great Nation&rdquo; app&lt;/a&gt; was found to 
contain</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    a</em></ins></span> back-door <span class="inserted"><ins><em>allowing 
developers</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>run any code they wish&lt;/a&gt; in</em></ins></span> 
the <span class="removed"><del><strong>engine&lt;/a&gt;
-     remotely.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;li&gt;&lt;p&gt;
-Mac OS X had an</strong></del></span>
-    <span class="inserted"><ins><em>users' phone, as 
&ldquo;superusers.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-intentional local back door for 4 years&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;Users reported</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying</em></ins></span> that <span class="inserted"><ins><em>the tests 
were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it</em></ins></span> 
&lt;a 
+    &lt;p&gt;The Chinese Communist Party's</em></ins></span> &lt;a 
     <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access</em></ins></span> to <span class="removed"><del><strong>replace 
Windows 7</strong></del></span> <span class="inserted"><ins><em>the phone's 
microphone, photos, text messages, contacts,</em></ins></span> and <span 
class="removed"><del><strong>8 with all-spying 
+    Microsoft</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
+    &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt;</em></ins></span> was 
<span class="removed"><del><strong>forcing them</strong></del></span> <span 
class="inserted"><ins><em>found</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7 and 8 with all-spying 
     Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Microsoft</strong></del></span>
-    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version</em></ins></span> was <span class="inserted"><ins><em>found to 
contain a
-    back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
+    &lt;p&gt;Microsoft was</strong></del></span> <span 
class="inserted"><ins><em>contain &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    a back-door allowing developers to run any code they 
wish&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>the
+    users' phone, as &ldquo;superusers.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;(1) The</em></ins></span> &lt;a 
+    &lt;p&gt;Note: The</em></ins></span> &lt;a 
     <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
     attacking computers</strong></del></span>
      <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying</em></ins></span> that <span 
class="removed"><del><strong>run Windows 7</strong></del></span> <span 
class="inserted"><ins><em>the tests were only performed on the
-    Android version of the app,</em></ins></span> and <span 
class="removed"><del><strong>8&lt;/a&gt;, switching</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be 
conducted</em></ins></span>
-    on <span class="inserted"><ins><em>Apple's operating 
system.&rdquo;&lt;/p&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying</em></ins></span> that <span class="removed"><del><strong>run 
Windows 7</strong></del></span> <span class="inserted"><ins><em>the tests were 
only performed on the Android version
+    of the app,</em></ins></span> and <span 
class="removed"><del><strong>8&lt;/a&gt;, switching</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be 
conducted</em></ins></span> on
+    <span class="inserted"><ins><em>Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908220"&gt;
@@ -934,7 +915,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:32 $
+$Date: 2019/10/19 10:32:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary-back-doors.it.po        19 Oct 2019 10:01:32 -0000      1.125
+++ proprietary-back-doors.it.po        19 Oct 2019 10:32:22 -0000      1.126
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -801,31 +801,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary-back-doors.ja-diff.html 19 Oct 2019 10:01:32 -0000      1.58
+++ proprietary-back-doors.ja-diff.html 19 Oct 2019 10:32:22 -0000      1.59
@@ -241,10 +241,12 @@
   <span class="inserted"><ins><em>&lt;li id="M201210220"&gt;
     &lt;p id="swindle-eraser"&gt;The Amazon
     Kindle-Swindle</em></ins></span> has a back door that <span 
class="inserted"><ins><em>has been used to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;can
-      &ldquo;upload</strong></del></span>
+      &ldquo;upload files&rdquo; as well as forcibly install
+      apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It is used</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
     remotely erase books&lt;/a&gt;.  One of the books erased was
-    &lt;cite&gt;1984&lt;/cite&gt;, by George Orwell.&lt;/p&gt;
+    &lt;cite&gt;1984&lt;/cite&gt;,</em></ins></span> by <span 
class="removed"><del><strong>14,000 Android 
applications.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>George Orwell.&lt;/p&gt;
 
     &lt;p&gt;Amazon responded to criticism by saying it
     would delete books only following orders from the
@@ -255,12 +257,15 @@
 
     &lt;p&gt;Do other ebook readers have back doors in their nonfree software? 
We
     don't know, and we have no way to find out.  There is no reason to
-    assume that they don't.&lt;/p&gt;
+    assume that they don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201011220"&gt;
-    &lt;p&gt;The iPhone has a back door for &lt;a
-    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable 
modem</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201011220"&gt;
+    &lt;p&gt;The iPhone</em></ins></span> has a <span 
class="inserted"><ins><em>back door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
     remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
     enabling it without understanding.&lt;/p&gt;
   &lt;/li&gt;
@@ -271,46 +276,69 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908270"&gt;
-    &lt;p&gt;A very popular app found in the
-    Google Play store contained a module that was designed to &lt;a
-    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
+    &lt;p&gt;A very popular app found</em></ins></span> in the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with</strong></del></span>
+    <span class="inserted"><ins><em>Google Play store contained a module that 
was designed to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
     install malware on the user's computer&lt;/a&gt;. The app developers
-    regularly used it to make the computer download and execute any code
+    regularly used it</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
+     remotely.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer download and execute any code
     they wanted.&lt;/p&gt;
 
     &lt;p&gt;This is a concrete example of what users are exposed to when they
     run nonfree apps. They can never be completely sure that a nonfree
-    app is safe.&lt;/p&gt;
+    app is safe.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+Mac OS X had an</strong></del></span>
 
-  &lt;li id="M201907100"&gt;
-    &lt;p&gt;Apple appears to say that &lt;a
-    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
-    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+  <span class="inserted"><ins><em>&lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a</em></ins></span> back door <span class="inserted"><ins><em>in 
MacOS&lt;/a&gt;</em></ins></span> for <span class="removed"><del><strong>4 
years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> <span 
class="inserted"><ins><em>automatically updating some
     (all?) apps.&lt;/p&gt;
 
     &lt;p&gt;The specific change described in the article was not
     malicious&mdash;it protected users from surveillance by third
-    parties&mdash;but that is a separate question.&lt;/p&gt;
+    parties&mdash;but</em></ins></span> that <span 
class="inserted"><ins><em>is a separate question.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro has a &lt;a
-    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
-    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7</strong></del></span> <span 
class="inserted"><ins><em>function&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article is full of confusions, errors and biases that we have
-    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+    &lt;p&gt;The article is full of confusions, errors</em></ins></span> and 
<span class="removed"><del><strong>8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft was in fact &lt;a 
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers</strong></del></span> <span 
class="inserted"><ins><em>biases</em></ins></span> that <span 
class="removed"><del><strong>run Windows 7 and 8&lt;/a&gt;, switching on a 
flag</strong></del></span> <span class="inserted"><ins><em>we have
+    an obligation to expose, given</em></ins></span> that <span 
class="removed"><del><strong>said whether</strong></del></span> <span 
class="inserted"><ins><em>we are making a link</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
 
     &lt;ul&gt;
-    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
-    any particular thing in its products. What it does enable the company
-    to do is sue other companies if they do some particular thing in
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a 
company</em></ins></span> to <span class="removed"><del><strong>Windows 10 when 
users 
+    had turned</strong></del></span> <span class="inserted"><ins><em>do
+    any particular thing in its products. What</em></ins></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how to permanently reject</strong></del></span> <span 
class="inserted"><ins><em>does enable</em></ins></span> the <span 
class="removed"><del><strong>downgrade</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span>
+    to <span class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>do is sue other companies if they do some particular 
thing in
     their products.&lt;/li&gt;
 
-    &lt;li&gt;A company's policies about when to attack users through a back
-    door are beside the point. Inserting the back door is wrong in the
-    first place, and using the back door is always wrong too. No software
+    &lt;li&gt;A company's policies about when</em></ins></span> to <span 
class="removed"><del><strong>involve use of</strong></del></span> <span 
class="inserted"><ins><em>attack users through</em></ins></span> a back
+    door <span class="inserted"><ins><em>are beside the point. Inserting the 
back door is wrong</em></ins></span> in <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>the
+    first place,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>using the back door is always wrong too. No software
     developer should have that power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
@@ -329,239 +357,182 @@
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
     to the boundary line, not even with a jackhammer, because it is an
     abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
-    &lt;/ul&gt;
+    &lt;/ul&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804010"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Most mobile phones have</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades that install</em></ins></span> a <span 
class="removed"><del><strong>universal back door, which has been 
used</strong></del></span> <span class="inserted"><ins><em>surveillance 
app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article for the facts it presents. It
+    &lt;p&gt;We link</em></ins></span> to <span class="inserted"><ins><em>the 
article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;
+    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A Chinese version of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
+    &lt;p&gt;Baidu's proprietary</em></ins></span> Android <span 
class="inserted"><ins><em>library, Moplus,</em></ins></span> has a <span 
class="removed"><del><strong>universal back door&lt;/a&gt;. Nearly all
+models of mobile phones have a universal</strong></del></span> back door <span 
class="removed"><del><strong>in the modem chip. So
+why did Coolpad bother to introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>that &lt;a
     
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-    can &ldquo;upload</em></ins></span> files&rdquo; as well as forcibly 
install
+    can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>controlled</strong></del></span> <span 
class="inserted"><ins><em>used</em></ins></span> by <span 
class="removed"><del><strong>Coolpad.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>14,000 
Android applications.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable 
modem</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Microsoft</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
     &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
-    door&lt;/a&gt;, Windows 8 has a back door for &lt;a
-    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+    door&lt;/a&gt;,</em></ins></span> Windows <span 
class="inserted"><ins><em>8</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> back door <span 
class="removed"><del><strong>through which</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever can be imposed on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;You might well decide to let a security service that you trust
     remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
-    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
-    should have the right to decide whom (if anyone) to trust in this
-    way.&lt;/p&gt;
+    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt;</em></ins></span> 
the <span class="removed"><del><strong>users&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;More information on when
+&lt;a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;</strong></del></span>
 <span class="inserted"><ins><em>programs, and you
+    should have the right to decide whom (if anyone) to trust 
in</em></ins></span> this <span class="removed"><del><strong>was used&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>way.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201103070"&gt;
-    &lt;p&gt;In Android, &lt;a
+  &lt;li id="M201103070"&gt;</em></ins></span>
+    &lt;p&gt;In <span class="removed"><del><strong>Windows 10, the 
universal</strong></del></span> <span class="inserted"><ins><em>Android, &lt;a
     
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google</em></ins></span> has a
-  <span class="removed"><del><strong>&lt;a 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
-     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span class="inserted"><ins><em>back door to 
remotely delete apps&lt;/a&gt;. (It was in a
+    Google has a</em></ins></span> back door <span 
class="removed"><del><strong>is no longer hidden; all
+&ldquo;upgrades&rdquo; will
+be</strong></del></span> <span class="inserted"><ins><em>to remotely delete 
apps&lt;/a&gt;. (It was in a
     program called GTalkService, which seems since then to have been
     merged into Google Play.)&lt;/p&gt;
 
-    &lt;p&gt;Google can also &lt;a
-    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  This is
-    not equivalent to a universal back door, but permits various dirty
+    &lt;p&gt;Google can also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+    forcibly</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Windows 8's</strong></del></span> <span 
class="inserted"><ins><em>remotely install apps&lt;/a&gt; through GTalkService. 
 This is
+    not equivalent to a universal</em></ins></span> back <span 
class="removed"><del><strong>doors are</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various dirty
     tricks.&lt;/p&gt;
 
     &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
-    malicious so far, the point is that nobody should have such power,
+    malicious</em></ins></span> so <span 
class="removed"><del><strong>gaping</strong></del></span> <span 
class="inserted"><ins><em>far, the point is that nobody should have such power,
     which could also be used maliciously.  You might well decide to
-    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for allowing 
it</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span>
-    <span 
class="inserted"><ins><em>&lt;em&gt;delete&lt;/em&gt;</em></ins></span> the 
<span class="removed"><del><strong>engine&lt;/a&gt;
-     remotely.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>programs, and you should have the right to decide
+    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; 
programs</em></ins></span> that
+<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;
+the German government has decided</strong></del></span>
+    it <span class="removed"><del><strong>can't be trusted&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>considers 
malicious.  But there is no excuse for allowing it to
+    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
     who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-intentional local</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;
-    &lt;p&gt;The iPhone has a</em></ins></span> back door <span 
class="removed"><del><strong>for 4 years&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</em></ins></span>
-    that <span class="inserted"><ins><em>allows Apple to remotely delete 
apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
-    this power because of course we can trust Apple.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
+    &lt;p&gt;The iPhone has a back door &lt;a
+    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+    that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
+    &ldquo;inappropriate&rdquo;.  Jobs said it's <span 
class="removed"><del><strong>ok</strong></del></span> <span 
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
+    this power because of course we can trust <span 
class="removed"><del><strong>Apple.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201910130.1"&gt;
-    &lt;p&gt;The Chinese Communist Party's</em></ins></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
-    &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt;</em></ins></span> was 
<span class="removed"><del><strong>forcing them</strong></del></span> <span 
class="inserted"><ins><em>found</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7 and 8 with all-spying 
-    Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Microsoft was in fact</strong></del></span> <span 
class="inserted"><ins><em>contain</em></ins></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    attacking computers that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    a back-door allowing developers to</em></ins></span> run <span 
class="removed"><del><strong>Windows 7 and 8&lt;/a&gt;, switching 
on</strong></del></span> <span class="inserted"><ins><em>any code they 
wish&lt;/a&gt; in the
+  &lt;li id="M201910130.1"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
+    &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt; was found to contain 
&lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    a back-door allowing developers to run any code they wish&lt;/a&gt; in the
     users' phone, as &ldquo;superusers.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
     Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes</em></ins></span> a 
<span class="removed"><del><strong>flag</strong></del></span> <span 
class="inserted"><ins><em>clarification
-    saying</em></ins></span> that <span class="removed"><del><strong>said 
whether to &ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>the tests were only performed on the Android version
-    of the app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>Windows 10 when</strong></del></span> <span 
class="inserted"><ins><em>Apple, &ldquo;this kind of
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires</em></ins></span> users 
-    <span class="removed"><del><strong>had turned</strong></del></span> <span 
class="inserted"><ins><em>to grant</em></ins></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
-
-    &lt;p&gt;Later on, Microsoft published instructions 
on</strong></del></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
-    how</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access</em></ins></span> to <span class="removed"><del><strong>permanently 
reject</strong></del></span> the <span class="removed"><del><strong>downgrade 
to Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
-    internet history&lt;/a&gt;, and the Android version was 
found</em></ins></span> to <span class="removed"><del><strong>involve use 
of</strong></del></span> <span 
class="inserted"><ins><em>contain</em></ins></span> a <span 
class="removed"><del><strong>back door</strong></del></span>
-    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish</em></ins></span> in <span class="removed"><del><strong>Windows 
7</strong></del></span> <span class="inserted"><ins><em>the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading</em></ins></span> and 
<span class="removed"><del><strong>8.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Most mobile phones have a universal back door, which has been used 
to</strong></del></span> <span class="inserted"><ins><em>using this
-    app is mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;(1) The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-turn them malicious&lt;/a&gt;.
+  &lt;li id="M201908220"&gt;
+    &lt;p&gt;ChromeBooks are programmed for obsolescence:
+    ChromeOS</em></ins></span> has a <span 
class="inserted"><ins><em>universal</em></ins></span> back door <span 
class="inserted"><ins><em>that is used</em></ins></span> for
+<span class="removed"><del><strong>&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese</strong></del></span>
-     <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post</em></ins></span> version of <span 
class="removed"><del><strong>Android has</strong></del></span> <span 
class="inserted"><ins><em>the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>universal back door&lt;/a&gt;. Nearly all
-models of mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes</em></ins></span> a <span 
class="removed"><del><strong>universal back door in</strong></del></span>
-    <span class="inserted"><ins><em>clarification saying 
that</em></ins></span> the <span class="removed"><del><strong>modem chip. So
-why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the
-    Android version of the app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this one is controlled
-by Coolpad.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple, 
&ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Microsoft Windows</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201908220"&gt;
-    &lt;p&gt;ChromeBooks are programmed for obsolescence:
-    ChromeOS</em></ins></span> has a universal back door <span 
class="removed"><del><strong>through which</strong></del></span> <span 
class="inserted"><ins><em>that is used for updates and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever can</strong></del></span>
+  &lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>updates</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
     ceases to operate at a predefined date&lt;/a&gt;. From then on, there
-    appears to</em></ins></span> be <span class="removed"><del><strong>imposed 
on</strong></del></span> <span class="inserted"><ins><em>no support whatsoever 
for</em></ins></span> the <span class="removed"><del><strong>users&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;More information on when
-&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-this was used&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;In <span class="removed"><del><strong>Windows 
10,</strong></del></span> <span class="inserted"><ins><em>other words, when you 
stop getting screwed by</em></ins></span> the <span 
class="removed"><del><strong>universal back door is no longer hidden; all
-&ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
-and immediately imposed&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+    appears to be no support whatsoever</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;Windows 8's</strong></del></span> back <span 
class="removed"><del><strong>doors are so gaping that
-&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>door,
-    you start getting screwed by</em></ins></span> the <span 
class="removed"><del><strong>German government has decided it can't be 
trusted&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obsolescence.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;In other words, when you stop getting screwed by the back door,
+    you start getting screwed by the obsolescence.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>FordPass Connect feature of some Ford 
vehicles</em></ins></span> has <span class="removed"><del><strong>a back 
door</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-that allows Apple</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
-&ldquo;inappropriate&rdquo;.  Jobs said it's ok for 
Apple</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
-    connected</em></ins></span> to <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
+  &lt;li id="M201902011"&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
+    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
+    connected to the cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>this power
-because</strong></del></span> <span class="inserted"><ins><em>you succeeded in 
breaking the
+    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>improved with</strong></del></span> <span 
class="inserted"><ins><em>you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars &lt;a
-    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature</em></ins></span> of <span 
class="removed"><del><strong>course we can trust Apple.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a universal 
back door&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;New GM cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
+    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Every nonfree program offers the user zero security against its
+    &lt;p&gt;Every nonfree program offers the user zero</em></ins></span> 
security <span class="removed"><del><strong>improvements&lt;/a&gt;; 
but</strong></del></span> <span class="inserted"><ins><em>against its
     developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;</em></ins></span>
+    worse.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711244"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>back door for
-&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
-it without understanding.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apple can, and regularly does,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones for</strong></del></span>
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved with
-  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but
-  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span> <span 
class="inserted"><ins><em>product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
+    universal back door&lt;/a&gt;. If the product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
     listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -911,7 +882,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:32 $
+$Date: 2019/10/19 10:32:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary-back-doors.ja.po        19 Oct 2019 10:01:32 -0000      1.106
+++ proprietary-back-doors.ja.po        19 Oct 2019 10:32:22 -0000      1.107
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -625,31 +625,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary-back-doors.pot  19 Oct 2019 10:01:33 -0000      1.74
+++ proprietary-back-doors.pot  19 Oct 2019 10:32:22 -0000      1.75
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -475,29 +475,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a "
-"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\";>
 "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a "
-"back-door allowing developers to run any code they wish in the users' phone, "
-"as &ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory "
-"at some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a "
-"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\";>
 "
-"Washington Post version of the article</a> (partly obfuscated, but readable "
-"after copy-pasting in a text editor) includes a clarification saying that "
-"the tests were only performed on the Android version of the app, and that, "
-"according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance "
-"could not be conducted on Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a "
 
"href=\"https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\";>
 "

Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary-back-doors.ru.po        19 Oct 2019 10:01:33 -0000      1.192
+++ proprietary-back-doors.ru.po        19 Oct 2019 10:32:22 -0000      1.193
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2018-11-13 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -676,31 +676,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary-surveillance.de-diff.html       19 Oct 2019 10:01:33 -0000      
1.99
+++ proprietary-surveillance.de-diff.html       19 Oct 2019 10:32:22 -0000      
1.100
@@ -974,17 +974,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909091"&gt;
@@ -3601,7 +3601,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:33 $
+$Date: 2019/10/19 10:32:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- proprietary-surveillance.de.po      19 Oct 2019 10:01:33 -0000      1.314
+++ proprietary-surveillance.de.po      19 Oct 2019 10:32:22 -0000      1.315
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1975,14 +1975,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-surveillance.es.po      19 Oct 2019 10:01:33 -0000      1.7
+++ proprietary-surveillance.es.po      19 Oct 2019 10:32:22 -0000      1.8
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2019-10-04 10:39+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish\n"
@@ -1486,14 +1486,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.480
retrieving revision 1.481
diff -u -b -r1.480 -r1.481
--- proprietary-surveillance.fr.po      19 Oct 2019 10:01:33 -0000      1.480
+++ proprietary-surveillance.fr.po      19 Oct 2019 10:32:22 -0000      1.481
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2019-10-03 13:12+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -1483,14 +1483,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary-surveillance.it-diff.html       19 Oct 2019 10:01:33 -0000      
1.166
+++ proprietary-surveillance.it-diff.html       19 Oct 2019 10:32:22 -0000      
1.167
@@ -1107,7 +1107,7 @@
     <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>phone's 
microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>Android version was found to contain a
     back-door allowing developers to run any code they wish 
in</em></ins></span> the <span class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using 
this</em></ins></span>
+    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
     app <span class="removed"><del><strong>remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> is
     <span class="removed"><del><strong>still spyware.&lt;/p&gt;
   &lt;/li&gt;
@@ -1115,22 +1115,22 @@
   &lt;li&gt;&lt;p&gt;The Meitu photo-editing
   app</strong></del></span> <span class="inserted"><ins><em>mandatory at some 
workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
   user data to</strong></del></span>
      <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application 
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes 
a
-    clarification saying that the tests were</em></ins></span> only
-  <span class="removed"><del><strong>can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>performed</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>the
-    Android version</em></ins></span> of <span 
class="removed"><del><strong>data in</strong></del></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>app,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application 
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes 
a clarification
+    saying that the tests were</em></ins></span> only
+  <span class="removed"><del><strong>can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>performed</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>the Android version</em></ins></span>
+    of <span class="removed"><del><strong>data in</strong></del></span> the 
<span class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>app,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
   alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909091"&gt;
@@ -3359,7 +3359,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:33 $
+$Date: 2019/10/19 10:32:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- proprietary-surveillance.it.po      19 Oct 2019 10:01:33 -0000      1.327
+++ proprietary-surveillance.it.po      19 Oct 2019 10:32:23 -0000      1.328
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1908,14 +1908,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary-surveillance.ja-diff.html       19 Oct 2019 10:01:34 -0000      
1.182
+++ proprietary-surveillance.ja-diff.html       19 Oct 2019 10:32:23 -0000      
1.183
@@ -1046,26 +1046,26 @@
       sent across</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
     internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>Android version was found</em></ins></span> to <span 
class="removed"><del><strong>Facebook's servers</strong></del></span> <span 
class="inserted"><ins><em>contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading</em></ins></span> and 
<span class="removed"><del><strong>face-recognition
+    phone, as &ldquo;superusers.&rdquo; Downloading</em></ins></span> and 
<span class="removed"><del><strong>face-recognition
       algorithms.&lt;/p&gt;
 
       &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
     Washington Post version</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>article&lt;/a&gt; 
(partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>article&lt;/a&gt; 
(partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>tests 
were only performed</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM</strong></del></span> 
<span class="inserted"><ins><em>the
-    Android version of the app,</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>that, 
according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+      is based</strong></del></span> <span class="inserted"><ins><em>tests 
were only performed</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM</strong></del></span> 
<span class="inserted"><ins><em>the Android version
+    of the app,</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>that, 
according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909091"&gt;
@@ -3218,7 +3218,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:34 $
+$Date: 2019/10/19 10:32:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.308
retrieving revision 1.309
diff -u -b -r1.308 -r1.309
--- proprietary-surveillance.ja.po      19 Oct 2019 10:01:34 -0000      1.308
+++ proprietary-surveillance.ja.po      19 Oct 2019 10:32:23 -0000      1.309
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1432,14 +1432,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary-surveillance.pot        19 Oct 2019 10:01:34 -0000      1.248
+++ proprietary-surveillance.pot        19 Oct 2019 10:32:23 -0000      1.249
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1042,13 +1042,13 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a "
 "back-door allowing developers to run any code they wish in the users' phone, "
-"as &ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory "
-"at some workplaces."
+"as &ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
+"some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a "
+"Note: The <a "
 
"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\";>
 "
 "Washington Post version of the article</a> (partly obfuscated, but readable "
 "after copy-pasting in a text editor) includes a clarification saying that "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.574
retrieving revision 1.575
diff -u -b -r1.574 -r1.575
--- proprietary-surveillance.ru.po      19 Oct 2019 10:01:34 -0000      1.574
+++ proprietary-surveillance.ru.po      19 Oct 2019 10:32:23 -0000      1.575
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -1469,14 +1469,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary.de-diff.html    19 Oct 2019 10:01:34 -0000      1.133
+++ proprietary.de-diff.html    19 Oct 2019 10:32:23 -0000      1.134
@@ -195,17 +195,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910070"&gt;
@@ -312,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:34 $
+$Date: 2019/10/19 10:32:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary.de.po   19 Oct 2019 10:01:34 -0000      1.175
+++ proprietary.de.po   19 Oct 2019 10:32:23 -0000      1.176
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -461,14 +461,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- proprietary.es.po   19 Oct 2019 10:01:34 -0000      1.231
+++ proprietary.es.po   19 Oct 2019 10:32:23 -0000      1.232
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -328,14 +328,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary.fr.po   19 Oct 2019 10:01:34 -0000      1.279
+++ proprietary.fr.po   19 Oct 2019 10:32:23 -0000      1.280
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2019-10-16 12:46+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -324,14 +324,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.it-diff.html    19 Oct 2019 10:01:35 -0000      1.145
+++ proprietary.it-diff.html    19 Oct 2019 10:32:23 -0000      1.146
@@ -194,17 +194,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910070"&gt;
@@ -311,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:35 $
+$Date: 2019/10/19 10:32:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary.it.po   19 Oct 2019 10:01:35 -0000      1.184
+++ proprietary.it.po   19 Oct 2019 10:32:23 -0000      1.185
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -465,14 +465,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.ja-diff.html    19 Oct 2019 10:01:35 -0000      1.148
+++ proprietary.ja-diff.html    19 Oct 2019 10:32:23 -0000      1.149
@@ -192,17 +192,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910070"&gt;
@@ -309,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:35 $
+$Date: 2019/10/19 10:32:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary.ja.po   19 Oct 2019 10:01:35 -0000      1.168
+++ proprietary.ja.po   19 Oct 2019 10:32:23 -0000      1.169
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -325,14 +325,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.nl-diff.html    19 Oct 2019 10:01:35 -0000      1.146
+++ proprietary.nl-diff.html    19 Oct 2019 10:32:23 -0000      1.147
@@ -194,17 +194,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910070"&gt;
@@ -311,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:35 $
+$Date: 2019/10/19 10:32:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary.nl.po   19 Oct 2019 10:01:35 -0000      1.158
+++ proprietary.nl.po   19 Oct 2019 10:32:23 -0000      1.159
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -367,14 +367,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary.pl-diff.html    19 Oct 2019 10:01:35 -0000      1.163
+++ proprietary.pl-diff.html    19 Oct 2019 10:32:23 -0000      1.164
@@ -192,17 +192,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910070"&gt;
@@ -309,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:35 $
+$Date: 2019/10/19 10:32:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary.pl.po   19 Oct 2019 10:01:35 -0000      1.151
+++ proprietary.pl.po   19 Oct 2019 10:32:23 -0000      1.152
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -546,14 +546,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.pot     19 Oct 2019 10:01:35 -0000      1.148
+++ proprietary.pot     19 Oct 2019 10:32:23 -0000      1.149
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -263,13 +263,13 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a "
 "back-door allowing developers to run any code they wish in the users' phone, "
-"as &ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory "
-"at some workplaces."
+"as &ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
+"some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a "
+"Note: The <a "
 
"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\";>
 "
 "Washington Post version of the article</a> (partly obfuscated, but readable "
 "after copy-pasting in a text editor) includes a clarification saying that "

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -b -r1.241 -r1.242
--- proprietary.pt-br.po        19 Oct 2019 10:01:35 -0000      1.241
+++ proprietary.pt-br.po        19 Oct 2019 10:32:23 -0000      1.242
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2019-10-17 02:11-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -317,14 +317,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.312
retrieving revision 1.313
diff -u -b -r1.312 -r1.313
--- proprietary.ru.po   19 Oct 2019 10:01:36 -0000      1.312
+++ proprietary.ru.po   19 Oct 2019 10:32:23 -0000      1.313
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -327,14 +327,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.zh-tw-diff.html 19 Oct 2019 10:01:36 -0000      1.125
+++ proprietary.zh-tw-diff.html 19 Oct 2019 10:32:23 -0000      1.126
@@ -195,17 +195,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;(1) The &lt;a
+    &lt;p&gt;Note: The &lt;a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;&lt;/p&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910070"&gt;
@@ -312,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:01:36 $
+$Date: 2019/10/19 10:32:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary.zh-tw.po        19 Oct 2019 10:01:36 -0000      1.136
+++ proprietary.zh-tw.po        19 Oct 2019 10:32:23 -0000      1.137
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -439,14 +439,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- pt-br.po    19 Oct 2019 10:01:36 -0000      1.194
+++ pt-br.po    19 Oct 2019 10:32:23 -0000      1.195
@@ -1329,14 +1329,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -6925,19 +6925,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- ru.po       19 Oct 2019 10:01:37 -0000      1.320
+++ ru.po       19 Oct 2019 10:32:23 -0000      1.321
@@ -1650,14 +1650,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -8744,19 +8744,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- zh-tw.po    19 Oct 2019 10:01:37 -0000      1.150
+++ zh-tw.po    19 Oct 2019 10:32:23 -0000      1.151
@@ -1258,14 +1258,14 @@
 "access to the phone's microphone, photos, text messages, contacts, and "
 "internet history</a>, and the Android version was found to contain a back-"
 "door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo;(1) Downloading and using this app is mandatory at "
+"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
 "data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
 "eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
 "article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -6061,19 +6061,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
 "door</a>. If the product as shipped doesn't act as a listening device, "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]