www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Thu, 31 Oct 2019 08:02:00 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/10/31 08:01:59

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.ru.po nl.po 
                         pl.po pot proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.482&r2=1.483
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.309&r2=1.310
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.249&r2=1.250
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.576&r2=1.577
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.249&r2=1.250
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.335&r2=1.336
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.155&r2=1.156

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- de.po       30 Oct 2019 17:00:13 -0000      1.155
+++ de.po       31 Oct 2019 12:01:57 -0000      1.156
@@ -1880,6 +1880,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- es.po       31 Oct 2019 09:59:52 -0000      1.219
+++ es.po       31 Oct 2019 12:01:57 -0000      1.220
@@ -1797,6 +1797,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- fr.po       30 Oct 2019 18:47:18 -0000      1.268
+++ fr.po       31 Oct 2019 12:01:57 -0000      1.269
@@ -1655,6 +1655,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- it.po       30 Oct 2019 17:00:14 -0000      1.155
+++ it.po       31 Oct 2019 12:01:57 -0000      1.156
@@ -1861,6 +1861,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- ja.po       30 Oct 2019 17:00:14 -0000      1.162
+++ ja.po       31 Oct 2019 12:01:57 -0000      1.163
@@ -1447,6 +1447,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-apple.de-diff.html  21 Oct 2019 07:00:13 -0000      1.53
+++ malware-apple.de-diff.html  31 Oct 2019 12:01:57 -0000      1.54
@@ -442,34 +442,26 @@
 
     &lt;p&gt;Offering a checking service</em></ins></span> as <span 
class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>an option could be
     useful and would not be wrong.  Requiring users to get
-    Apple's approval</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>tyranny. Apple 
says</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>check 
will
-    only look for malware (not counting the malware that</em></ins></span> is 
<span class="removed"><del><strong>a way to</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;,</strong></del></span>
+    Apple's approval is tyranny. Apple says the check will
+    only look for malware (not counting the malware that</em></ins></span> is 
&lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html#TOC"&gt;part of
-    the operating system&lt;/a&gt;),</em></ins></span> but <span 
class="removed"><del><strong>it's active</strong></del></span> <span 
class="inserted"><ins><em>Apple could change that policy step</em></ins></span>
-    by <span class="removed"><del><strong>default so it still counts as a
-      surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span class="inserted"><ins><em>step.  Or perhaps 
Apple will define malware</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>include any app
+    the operating system&lt;/a&gt;), but Apple could change that policy 
step</em></ins></span>
+    by <span class="inserted"><ins><em>step.  Or perhaps Apple will define 
malware to include any app
     that China does not like.&lt;/p&gt;
 
-    &lt;p&gt;For free software, this means users will need</em></ins></span> 
to <span class="removed"><del><strong>break</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> Apple's
-      <span class="removed"><del><strong>security</strong></del></span>
-    <span class="inserted"><ins><em>approval after compilation.  This 
amounts</em></ins></span> to <span class="removed"><del><strong>get at 
them,</strong></del></span> <span class="inserted"><ins><em>a system of 
surveilling
-    the use of free programs.&lt;/p&gt;
+    &lt;p&gt;For free software, this means users will need to get Apple's
+    approval after compilation.  This amounts to a system of 
surveilling</em></ins></span>
+    the
+      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>free 
programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200803070"&gt;
     &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-    iOS, the operating system of the Apple iThings, is the prototype
-    of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
+    iOS, the operating system of the Apple iThings,</em></ins></span> is <span 
class="inserted"><ins><em>the prototype
+    of</em></ins></span> a <span class="removed"><del><strong>way 
to</strong></del></span> <span class="inserted"><ins><em>jail&lt;/a&gt;.  It 
was Apple that introduced the practice of
     designing general purpose computers with censorship of application
     programs.&lt;/p&gt;
 
@@ -588,55 +580,77 @@
 
   &lt;li id="M201506250"&gt;
     &lt;p&gt;Apple has banned iThing
-    applications that show the confederate flag.  &lt;a
-    
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
-    Not only those that use it as a symbol of 
racism&lt;/a&gt;,</em></ins></span> but <span class="removed"><del><strong>NSA 
can access</strong></del></span> <span class="inserted"><ins><em>even
-    strategic games that use it to represent confederate army units
+    applications that show the confederate flag.</em></ins></span>  &lt;a 
<span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
+    Not only those that use</em></ins></span> it <span 
class="removed"><del><strong>still counts</strong></del></span> as a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span> <span 
class="inserted"><ins><em>symbol</em></ins></span> of <span 
class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to break 
Apple's
+      security to get at them,</strong></del></span> <span 
class="inserted"><ins><em>racism&lt;/a&gt;,</em></ins></span> but <span 
class="removed"><del><strong>NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+  MacOS automatically sends</strong></del></span> <span 
class="inserted"><ins><em>even
+    strategic games that use it</em></ins></span> to <span 
class="inserted"><ins><em>represent confederate army units
     fighting in the Civil War.&lt;/p&gt;
 
-    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
-    not be allowed to censor apps.  Even if Apple carried out this act of
+    &lt;p&gt;This ludicrous rigidity illustrates the point 
that</em></ins></span> Apple <span class="removed"><del><strong>servers unsaved 
documents being
+  edited&lt;/a&gt;. The &lt;a
+  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  things you have</strong></del></span> <span 
class="inserted"><ins><em>should</em></ins></span>
+    not <span class="removed"><del><strong>decided</strong></del></span> <span 
class="inserted"><ins><em>be allowed</em></ins></span> to <span 
class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>censor apps.  Even if Apple carried out this act of
     censorship with some care, it would still be wrong.  Whether racism
-    is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not have the power to impose its views
-    about either of these questions, or</em></ins></span> any <span 
class="inserted"><ins><em>other.&lt;/p&gt;
+    is bad, whether educating people about drone attacks is 
bad,</em></ins></span> are <span class="removed"><del><strong>even more 
sensitive than</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span>
+    the
+  <span class="removed"><del><strong>things you have stored in 
files&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple has made various
+  &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files to</strong></del></span> <span 
class="inserted"><ins><em>real issue.</em></ins></span>  Apple <span 
class="removed"><del><strong>servers without asking permission&lt;/a&gt;.
+  This exposes</strong></del></span> <span class="inserted"><ins><em>should 
not have</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>power</em></ins></span> to <span 
class="removed"><del><strong>Big Brother</strong></del></span> <span 
class="inserted"><ins><em>impose its views
+    about either of these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples</em></ins></span> of <span class="removed"><del><strong>them 
through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
-  MacOS automatically sends</strong></del></span> <span 
class="inserted"><ins><em>Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>perhaps</strong></del></span> <span 
class="inserted"><ins><em>inconsistent censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>other snoops.&lt;/p&gt;
+
+  &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
+    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  
It</em></ins></span> also <span class="removed"><del><strong>demonstrates how 
you can't trust proprietary software,
+  because even if today's version doesn't have</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
-    banned a game about growing marijuana&lt;/a&gt;, while permitting games
+    banned</em></ins></span> a <span class="removed"><del><strong>malicious
+  functionality, tomorrow's version might add it. The developer won't
+  remove</strong></del></span> <span class="inserted"><ins><em>game about 
growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
     killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed the locations
+    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>malfeature unless many users push back hard, 
and</strong></del></span> <span class="inserted"><ins><em>locations
     of US drone assassinations, giving various excuses. Each
-    time the developers fixed one &ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection,</em></ins></span> 
Apple <span class="removed"><del><strong>servers unsaved documents being
-  edited&lt;/a&gt;. The</strong></del></span> &lt;a
-  <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
-  things you have not decided to save are even more sensitive 
than</strong></del></span>
+    time</em></ins></span> the <span class="removed"><del><strong>users
+  can't remove it themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Various operations in</strong></del></span> <span 
class="inserted"><ins><em>developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, 
Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the
-  <span class="removed"><del><strong>things you have stored in 
files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send reports to Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app 
based on the subject matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple has made 
various</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in 
MacOS:</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -644,120 +658,118 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
-  MacOS programs send files</strong></del></span>
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users, or make option settings 
hard</em></ins></span>
-    to <span class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
+    interfaces designed</em></ins></span> to <span 
class="removed"><del><strong>Apple.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This allows a company such as</em></ins></span> Apple <span 
class="removed"><del><strong>servers without asking permission&lt;/a&gt;.
-  This exposes the files</strong></del></span> to <span 
class="removed"><del><strong>Big Brother and perhaps</strong></del></span> 
<span class="inserted"><ins><em>say, &ldquo;We allow users</em></ins></span>
-    to <span class="removed"><del><strong>other snoops.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple admits the
+  &lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+  spying in a search facility&lt;/a&gt;, but there's</strong></del></span> 
<span class="inserted"><ins><em>mislead users, or make option settings hard
+    to find&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;It also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>turn this off&rdquo; while ensuring that few will 
understand</em></ins></span> how <span class="removed"><del><strong>you can't 
trust proprietary software,
-  because even if today's version doesn't have a malicious
-  functionality, tomorrow's version might add it. The developer won't
-  remove the malfeature unless many users push back hard, and the users
-  can't remove</strong></del></span>
-    <span class="inserted"><ins><em>to actually turn</em></ins></span> it 
<span class="removed"><del><strong>themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>off.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This allows</em></ins></span> a <span 
class="removed"><del><strong>lot
+  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
+  more snooping that</strong></del></span> <span 
class="inserted"><ins><em>company such as</em></ins></span> Apple <span 
class="removed"><del><strong>has not talked 
about&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations in
-  &lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+  Several &ldquo;features&rdquo;</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;
 
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send</strong></del></span> <span 
class="inserted"><ins><em>software.  This section</em></ins></span> reports 
<span class="inserted"><ins><em>examples of hard sell and other unjust 
commercial tactics by Apple.&lt;/p&gt;
+&lt;p&gt;Proprietary companies can take advantage</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>their customers by imposing arbitrary 
limits</em></ins></span> to <span class="removed"><del><strong>exist for no 
possible
+  purpose other than surveillance&lt;/a&gt;.  Here is the &lt;a
+  
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+  Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;The &lt;a class="not-a-duplicate"
+  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  iBeacon&lt;/a&gt; lets stores determine exactly where</strong></del></span> 
<span class="inserted"><ins><em>their use of</em></ins></span> the <span 
class="removed"><del><strong>iThing is,</strong></del></span> <span 
class="inserted"><ins><em>software.  This section reports examples of hard 
sell</em></ins></span> and
+  <span class="removed"><del><strong>get</strong></del></span> other <span 
class="removed"><del><strong>info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does, &lt;a
+  
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>unjust commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
-    &lt;p&gt;Apple Siri &lt;a
-    
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
-    to <span class="removed"><del><strong>Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>give 
you information&lt;/a&gt; about music charts if you're not an Apple
-    Music subscriber.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Apple Siri</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
+    to give you information&lt;/a&gt; about music charts if 
you're</em></ins></span> not <span class="removed"><del><strong>as much 
as</strong></del></span> <span class="inserted"><ins><em>an</em></ins></span> 
Apple <span 
class="removed"><del><strong>claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>Music 
subscriber.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
 
+&lt;h3 <span class="removed"><del><strong>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
 
-&lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;
+&lt;p&gt;In this section, we list characteristics of</strong></del></span> 
<span class="inserted"><ins><em>id="sabotage"&gt;Sabotage&lt;/h3&gt;
 
-&lt;p&gt;These are situations</em></ins></span> in <span 
class="removed"><del><strong>MacOS:
-  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  Spotlight search&lt;/a&gt; sends users' search terms</strong></del></span> 
<span class="inserted"><ins><em>which Apple employs its power over 
users</em></ins></span>
-to <span class="removed"><del><strong>Apple.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple admits the
-  &lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
-  spying</strong></del></span> <span class="inserted"><ins><em>directly 
intervene</em></ins></span> in <span class="removed"><del><strong>a search 
facility&lt;/a&gt;, but there's a lot
-  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
-  more snooping</strong></del></span> <span 
class="inserted"><ins><em>ways</em></ins></span> that <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
+&lt;p&gt;These are situations in which</em></ins></span> Apple <span 
class="removed"><del><strong>programs that block or
+hinder</strong></del></span> <span class="inserted"><ins><em>employs its power 
over</em></ins></span> users <span class="removed"><del><strong>from 
switching</strong></del></span>
+to <span class="removed"><del><strong>any alternative 
program&mdash;and,</strong></del></span> <span 
class="inserted"><ins><em>directly intervene</em></ins></span> in
+<span class="removed"><del><strong>particular, from 
switching</strong></del></span> <span class="inserted"><ins><em>ways that harm 
them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When</em></ins></span> Apple <span 
class="removed"><del><strong>has not talked about&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-  Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>suspects a user</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>fraud, it
+    &lt;p&gt;When Apple suspects a user of fraud, it
     judges the case secretly and presents the verdict
-    as a fait accompli.  The punishment</em></ins></span> to <span 
class="removed"><del><strong>exist</strong></del></span> <span 
class="inserted"><ins><em>a user found guilty &lt;a
+    as a fait accompli.  The punishment</em></ins></span> to <span 
class="removed"><del><strong>free software</strong></del></span> <span 
class="inserted"><ins><em>a user found guilty &lt;a
     
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
-    being cut off</em></ins></span> for <span class="removed"><del><strong>no 
possible
-  purpose other than surveillance&lt;/a&gt;.  Here is</strong></del></span> 
<span class="inserted"><ins><em>life, which more-or-less 
cripples</em></ins></span> the <span class="removed"><del><strong>&lt;a
-  
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-  Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's Apple
-    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    being cut off for life,</em></ins></span> which <span 
class="removed"><del><strong>can liberate the device</strong></del></span> 
<span class="inserted"><ins><em>more-or-less cripples</em></ins></span> the 
<span class="removed"><del><strong>software runs on.&lt;/p&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810240"&gt;
-    &lt;p&gt;Apple and Samsung deliberately</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  iBeacon&lt;/a&gt; lets stores determine exactly where</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
-    the <span class="removed"><del><strong>iThing is, and
-  get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>performance of older phones to force users to buy 
their newer
-    phones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;Apple</strong></del></span> <span class="inserted"><ins><em>user's 
Apple</em></ins></span>
+    devices <span class="removed"><del><strong>lock</strong></del></span> 
<span class="inserted"><ins><em>forever&lt;/a&gt;.  There is no 
appeal.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+  &lt;li id="M201810240"&gt;
+    &lt;p&gt;Apple and Samsung deliberately &lt;a
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force</em></ins></span> users <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>to buy their newer
+    phones&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201805310"&gt;
+  &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data</strong></del></span>
+<span 
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+solely</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram</em></ins></span> from <span 
class="removed"><del><strong>iPhones</strong></del></span> <span 
class="inserted"><ins><em>upgrading its app</em></ins></span> for <span 
class="removed"><del><strong>the state&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
month&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This evidently has to do with Russia's command</em></ins></span> 
to Apple <span class="removed"><del><strong>services&lt;/a&gt; by being 
designed</strong></del></span> to <span class="removed"><del><strong>be 
incompatible with all
+other options, ethical or unethical.&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>may have 
improved</strong></del></span> <span class="inserted"><ins><em>evidently has to 
do</em></ins></span> with
-  <span class="removed"><del><strong>&lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>Russia's command to Apple to block
+&lt;li&gt;
+&lt;p&gt;iWork (office</strong></del></span> <span 
class="inserted"><ins><em>block
     Telegram in Russia.&lt;/p&gt;
 
-    &lt;p&gt;The Telegram client is free software on other 
platforms,</em></ins></span> but
-  <span class="removed"><del><strong>&lt;a 
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</strong></del></span>
 not <span class="removed"><del><strong>as much as Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on
+    &lt;p&gt;The Telegram client is free</em></ins></span> software <span 
class="removed"><del><strong>that runs</strong></del></span> on <span 
class="removed"><del><strong>MacOS, iOS and iCloud) uses secret
+formats</strong></del></span> <span class="inserted"><ins><em>other platforms, 
but not on
     iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
-    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;</em></ins></span>
+    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
-
-&lt;p&gt;In this section, we list characteristics</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
-    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions</em></ins></span> 
of <span class="inserted"><ins><em>MacOS.&lt;/p&gt;
+  &lt;li id="M201710044"&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot 
drives,</em></ins></span> and &lt;a <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means
+of converting them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    changes the file system from HFS+</em></ins></span>  to <span 
class="inserted"><ins><em>APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows</em></ins></span> or <span 
class="inserted"><ins><em>even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706060"&gt;
@@ -765,88 +777,42 @@
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile,</em></ins></span> Apple <span 
class="removed"><del><strong>programs that block or
-hinder users</strong></del></span> <span class="inserted"><ins><em>stops 
people</em></ins></span> from <span 
class="removed"><del><strong>switching</strong></del></span> <span 
class="inserted"><ins><em>fixing problems themselves;
+    &lt;p&gt;Meanwhile, Apple stops people</em></ins></span> from <span 
class="removed"><del><strong>Open Document Formats&lt;/a&gt;. iWork formats
+have changed several times since they were first introduced. This may have
+had</strong></del></span> <span class="inserted"><ins><em>fixing problems 
themselves;
     that's the nature of proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains DRM specifically designed</em></ins></span> to <span 
class="removed"><del><strong>any alternative program&mdash;and, in
-particular, from switching</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    iPhone 7 contains DRM specifically designed to &lt;a
     
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;</em></ins></span>
-    to <span class="removed"><del><strong>free software which can 
liberate</strong></del></span> <span 
class="inserted"><ins><em>describe</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>DRM, but we prefer to use</em></ins></span> the <span 
class="removed"><del><strong>software runs on.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>term &lt;a
-    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
-    handcuffs&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201606080"&gt;</em></ins></span>
-    &lt;p&gt;Apple <span class="removed"><del><strong>devices 
lock</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-    stops</em></ins></span> users <span class="inserted"><ins><em>from fixing 
the security bugs</em></ins></span> in <span class="removed"><del><strong>&lt;a
-href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-solely</strong></del></span> <span class="inserted"><ins><em>Quicktime for 
Windows&lt;/a&gt;,
-    while refusing</em></ins></span> to <span class="inserted"><ins><em>fix 
them itself.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201605040"&gt;
-    &lt;p&gt;The</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt; by being 
designed</strong></del></span> <span class="inserted"><ins><em>Music client 
program &lt;a
-    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
-    the user's file system for music files, copies them</em></ins></span> to 
<span class="removed"><del><strong>be incompatible with all
-other options, ethical or unethical.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
-formats</strong></del></span> <span class="inserted"><ins><em>an Apple 
server,</em></ins></span>
-    and <span class="inserted"><ins><em>deletes them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201602050"&gt;
-    &lt;p&gt;iOS version 9 for iThings</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means
-of converting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages</em></ins></span>
-    them <span class="removed"><del><strong>to or from Open Document 
Formats&lt;/a&gt;. iWork formats
-have changed several times since</strong></del></span> <span 
class="inserted"><ins><em>irreparably if</em></ins></span> they were <span 
class="removed"><del><strong>first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em>repaired by someone 
other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
-    was wrong.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201510020"&gt;
-    &lt;p&gt;Apple forced millions</em></ins></span> of <span 
class="removed"><del><strong>thwarting &lt;a
+    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
+    to describe</em></ins></span> the <span 
class="removed"><del><strong>effect of thwarting &lt;a
 href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
 efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
 
-&lt;p&gt;iWork formats are considered</strong></del></span> <span 
class="inserted"><ins><em>iThings to</em></ins></span> &lt;a
+&lt;p&gt;iWork formats are considered</strong></del></span> <span 
class="inserted"><ins><em>DRM, but we prefer to use the term</em></ins></span> 
&lt;a
 <span 
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
-unfit for document preservation&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;In MacOS and iOS,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
-    a system upgrade without asking</em></ins></span> the <span 
class="removed"><del><strong>procedure for</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;. Apple did not
-    forcibly install the upgrade but the downloading alone caused lots
-    of trouble.&lt;/p&gt;
+unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"&gt;
 digital
+    handcuffs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201412040"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;In MacOS and iOS, the procedure for</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
     &lt;p&gt;Apple</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
 converting images</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted</em></ins></span> from <span 
class="inserted"><ins><em>iPods</em></ins></span> the <span 
class="removed"><del><strong>Photos format&lt;/a&gt; to a free format is so 
tedious
-and time-consuming</strong></del></span> <span 
class="inserted"><ins><em>music</em></ins></span> that users <span 
class="removed"><del><strong>just give up if they have a lot of 
them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>had got 
from internet music
-    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+    stops users</em></ins></span> from <span 
class="inserted"><ins><em>fixing</em></ins></span> the <span 
class="removed"><del><strong>Photos format&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>security bugs in Quicktime for 
Windows&lt;/a&gt;,
+    while refusing</em></ins></span> to <span class="removed"><del><strong>a 
free format is so tedious
+and time-consuming that users just give up if they have a lot of 
them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>fix them 
itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -854,77 +820,117 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;iTunes videos have DRM, which allows</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M200709270"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
-    An</em></ins></span> Apple <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>firmware &ldquo;upgrade&rdquo; bricked iPhones that 
had been
-    unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
-    not approved by</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;
+    &lt;p&gt;The</em></ins></span> Apple <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>Music client program</em></ins></span> &lt;a
   <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its customers can
-  watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The DMCA 
and</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-
-&lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="removed"><del><strong>EU Copyright Directive 
make</strong></del></span> <span class="inserted"><ins><em>Great Nation&rdquo; 
app requires users to grant</em></ins></span> it &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access</em></ins></span> to <span class="removed"><del><strong>study how 
iOS cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing</strong></del></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;
+  watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a
-  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-  Apple uses DRM software to prevent people from charging an iThing with a 
+  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
+    the <span class="removed"><del><strong>EU Copyright Directive make it &lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span> <span class="inserted"><ins><em>user's 
file system for music files, copies them</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
+      would require circumventing the iOS DRM.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>an Apple server,
+    and deletes them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a
+  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201602050"&gt;
+    &lt;p&gt;iOS version 9 for iThings &lt;a
+    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if they were repaired by someone other than
+    Apple&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>uses DRM software to prevent 
people</strong></del></span> <span class="inserted"><ins><em>eventually backed 
off from this policy under
+    criticism</em></ins></span> from <span 
class="removed"><del><strong>charging an iThing with a 
   generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;&lt;a
   
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
   DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-  focuses on</strong></del></span> <span class="inserted"><ins><em>phone's 
microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>fact that a new model of Macbook 
introduced</strong></del></span> <span class="inserted"><ins><em>Android 
version was found to contain</em></ins></span> a <span 
class="removed"><del><strong>requirement
-  for monitors</strong></del></span>
-    <span class="inserted"><ins><em>back-door allowing 
developers</em></ins></span> to <span class="removed"><del><strong>have 
malicious hardware, but DRM software in MacOS is
-  involved</strong></del></span> <span class="inserted"><ins><em>run any code 
they wish</em></ins></span> in <span 
class="removed"><del><strong>activating</strong></del></span> the <span 
class="removed"><del><strong>hardware. The software for accessing iTunes
-  is also responsible.&lt;/p&gt;
+  focuses on</strong></del></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not 
acknowledged</em></ins></span> that <span class="removed"><del><strong>a new 
model</strong></del></span> <span class="inserted"><ins><em>this
+    was wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201510020"&gt;
+    &lt;p&gt;Apple forced millions</em></ins></span> of <span 
class="removed"><del><strong>Macbook introduced a requirement
+  for monitors</strong></del></span> <span 
class="inserted"><ins><em>iThings</em></ins></span> to <span 
class="removed"><del><strong>have malicious hardware,</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
+    a system upgrade without asking the users&lt;/a&gt;. Apple did not
+    forcibly install the upgrade</em></ins></span> but <span 
class="removed"><del><strong>DRM software in MacOS is
+  involved in activating</strong></del></span> the <span 
class="removed"><del><strong>hardware.</strong></del></span> <span 
class="inserted"><ins><em>downloading alone caused lots
+    of trouble.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on 
Windows</strong></del></span> <span class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo; Downloading</em></ins></span> and 
<span class="removed"><del><strong>said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201412040"&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+    deleted from iPods the music that users had got from internet music
+    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200709270"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+    unlocked&lt;/a&gt;.</em></ins></span>  The <span 
class="removed"><del><strong>software for accessing iTunes
+  is</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;upgrade&rdquo;</em></ins></span> also <span 
class="removed"><del><strong>responsible.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>deactivated applications
+    not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
+  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 &lt;/ul&gt;
 
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+
+&lt;h3 <span class="removed"><del><strong>id="jails"&gt;Apple Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS, the operating system of the Apple iThings,</strong></del></span> <span 
class="inserted"><ins><em>using this
-    app</em></ins></span> is <span class="removed"><del><strong>the 
prototype</strong></del></span> <span class="inserted"><ins><em>mandatory at 
some workplaces.&lt;/p&gt;
+iOS, the operating system of the</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
-    &lt;p&gt;Note: The &lt;a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version</em></ins></span> of <span 
class="inserted"><ins><em>the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>jail&lt;/a&gt;.  It was 
Apple</strong></del></span> <span class="inserted"><ins><em>text editor) 
includes a clarification
-    saying</em></ins></span> that <span 
class="removed"><del><strong>introduced the practice of
-designing general purpose computers with censorship of application
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from</em></ins></span> Apple <span 
class="removed"><del><strong>iThings, is</strong></del></span> <span 
class="inserted"><ins><em>devices in China to</em></ins></span> the <span 
class="removed"><del><strong>prototype
+of a jail&lt;/a&gt;.  It was Apple</strong></del></span> <span 
class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs</em></ins></span> that <span 
class="removed"><del><strong>introduced the practice of
+designing general purpose computers</strong></del></span> <span 
class="inserted"><ins><em>possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent 
collaborates</em></ins></span>
+    with <span class="removed"><del><strong>censorship</strong></del></span> 
<span class="inserted"><ins><em>the Chinese government, its Safe Browsing black 
list most certainly
+    contains the websites</em></ins></span> of <span 
class="removed"><del><strong>application
 programs.&lt;/p&gt;
 
-&lt;p&gt;Here is an article about</strong></del></span> the <span 
class="removed"><del><strong>&lt;a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-code signing&lt;/a&gt; that</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on</em></ins></span> the 
<span class="removed"><del><strong>iThings use to lock up</strong></del></span> 
<span class="inserted"><ins><em>Android version
-    of</em></ins></span> the <span class="removed"><del><strong>user.&lt;/p&gt;
-
-&lt;p&gt;Curiously, Apple is beginning</strong></del></span> <span 
class="inserted"><ins><em>app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>allow limited passage through the
-walls</strong></del></span> <span class="inserted"><ins><em>Apple, &ldquo;this 
kind</em></ins></span> of <span class="removed"><del><strong>the iThing jail: 
users can now install</strong></del></span>
-    <span class="inserted"><ins><em>&lsquo;superuser&rsquo; surveillance could 
not be conducted on
+&lt;p&gt;Here is an article about</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
+    the <span class="inserted"><ins><em>Great Nation&rdquo; app requires users 
to grant it</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+code signing&lt;/a&gt; that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to</em></ins></span> the <span class="removed"><del><strong>iThings 
use</strong></del></span> <span class="inserted"><ins><em>phone's microphone, 
photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was 
found</em></ins></span> to <span class="removed"><del><strong>lock 
up</strong></del></span> <span class="inserted"><ins><em>contain a
+    back-door allowing developers to run any code they wish 
in</em></ins></span> the <span class="removed"><del><strong>user.&lt;/p&gt;
+
+&lt;p&gt;Curiously, Apple</strong></del></span> <span 
class="inserted"><ins><em>users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app</em></ins></span> is <span class="removed"><del><strong>beginning to 
allow limited passage through</strong></del></span> <span 
class="inserted"><ins><em>mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of</em></ins></span> the
+<span class="removed"><del><strong>walls</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android 
version</em></ins></span>
+    of the <span class="removed"><del><strong>iThing jail: users can now 
install</strong></del></span> <span class="inserted"><ins><em>app, and that, 
according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1303,7 +1309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/21 07:00:13 $
+$Date: 2019/10/31 12:01:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- malware-apple.de.po 21 Oct 2019 07:00:13 -0000      1.148
+++ malware-apple.de.po 31 Oct 2019 12:01:57 -0000      1.149
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1246,6 +1246,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- malware-apple.es.po 22 Oct 2019 10:50:07 -0000      1.174
+++ malware-apple.es.po 31 Oct 2019 12:01:57 -0000      1.175
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -1095,6 +1096,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- malware-apple.fr.po 25 Oct 2019 17:59:14 -0000      1.182
+++ malware-apple.fr.po 31 Oct 2019 12:01:57 -0000      1.183
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2019-10-21 11:28+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -1098,6 +1099,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-apple.it-diff.html  21 Oct 2019 07:00:13 -0000      1.61
+++ malware-apple.it-diff.html  31 Oct 2019 12:01:57 -0000      1.62
@@ -429,7 +429,7 @@
     by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system 
itself.</em></ins></span>
-    While subjecting its users to its own surveillance, it tries to
+    While subjecting its users to <span class="removed"><del><strong>its own 
surveillance,</strong></del></span> <span class="inserted"><ins><em>its own 
surveillance, it tries to
     protect its users from Russian surveillance, and is therefore subject
     to Russian censorship.&lt;/p&gt;
 
@@ -437,36 +437,24 @@
     apps.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Apple</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701050"&gt;
-    &lt;p&gt;Apple</em></ins></span> used its censorship system to enforce 
China's censorship &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
-    by</em></ins></span> blocking distribution of the New York Times <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201701050"&gt;
+    &lt;p&gt;Apple used its censorship system to enforce China's censorship 
&lt;a
+    
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
+    by blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605190"&gt;
-    &lt;p&gt;Apple</em></ins></span> censors games, &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
-    banning</em></ins></span> some games from the cr&hellip;app 
store&lt;/a&gt; because of which
+    &lt;p&gt;Apple censors games, &lt;a
+    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+    banning some games from the cr&hellip;app store&lt;/a&gt; because of which
     political points they suggest. Some political points are apparently
     considered acceptable.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Apple</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+  &lt;li id="M201509290"&gt;
+    &lt;p&gt;Apple &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
     banned a program from the App Store&lt;/a&gt; because its developers
-    committed the enormity of disassembling some <span 
class="removed"><del><strong>iThings.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iThings.&lt;/p&gt;
+    committed the enormity of disassembling some iThings.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509230"&gt;
@@ -490,39 +478,38 @@
 
     &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
     not be allowed to censor apps.  Even if Apple carried out this act of
-    censorship with some care, it would still be wrong.  Whether racism
+    censorship with some care,</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>would still be wrong.  Whether racism
     is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not have the power to impose its views
+    the real issue.  Apple should not have the power</em></ins></span> to 
<span class="removed"><del><strong>protect</strong></del></span> <span 
class="inserted"><ins><em>impose</em></ins></span> its <span 
class="removed"><del><strong>users from Russian 
surveillance,</strong></del></span> <span class="inserted"><ins><em>views
     about either of these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>is therefore
+subject</strong></del></span> <span class="inserted"><ins><em>inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>Russian censorship.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
+    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>point here is</strong></del></span> <span 
class="inserted"><ins><em>iThings for a time.  It also &lt;a
     
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
-    about other crimes such as killing people.  Perhaps</em></ins></span> 
Apple <span class="inserted"><ins><em>considers
+    about other crimes such as killing people.  Perhaps Apple considers
     killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple</em></ins></span> rejected an app that displayed the 
locations
-    of US drone assassinations, giving various excuses. Each
+    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>wrong</strong></del></span> <span 
class="inserted"><ins><em>locations</em></ins></span>
+    of <span class="removed"><del><strong>Apple's 
censorship</strong></del></span> <span class="inserted"><ins><em>US drone 
assassinations, giving various excuses. Each
     time the developers fixed one &ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection, Apple &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted</em></ins></span> it was censoring the app based on the subject 
<span class="removed"><del><strong>matter&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-As of 2015, Apple</strong></del></span> <span 
class="inserted"><ins><em>matter&lt;/a&gt;.&lt;/p&gt;
+    complained about another.  After the fifth rejection, Apple &lt;a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -531,12 +518,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
-rights</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users,</em></ins></span> or <span 
class="removed"><del><strong>would help women find 
abortions&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>make option 
settings hard
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed to mislead users, or make option settings hard
     to find&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
@@ -548,71 +532,108 @@
 
 &lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;
 
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.</em></ins></span>  This 
<span class="removed"><del><strong>particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-affects</strong></del></span> <span class="inserted"><ins><em>section reports 
examples of hard sell and</em></ins></span> other <span 
class="inserted"><ins><em>unjust commercial tactics by Apple.&lt;/p&gt;
+&lt;p&gt;Proprietary companies can take advantage</em></ins></span> of
+<span class="removed"><del><strong>apps.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>their customers by imposing arbitrary limits to their 
use of the software.  This section reports examples of hard sell and other 
unjust commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
     &lt;p&gt;Apple Siri &lt;a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
-    to give you information&lt;/a&gt; about music charts if you're not 
an</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;</strong></del></span>
-    <span class="inserted"><ins><em>Music subscriber.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
-&lt;/ul&gt;
+    to give you information&lt;/a&gt; about music charts if you're not an Apple
+    Music subscriber.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="sabotage"&gt;Sabotage&lt;/h3&gt;</em></ins></span>
+&lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;
 
-&lt;p&gt;These <span class="removed"><del><strong>bugs are/were not 
intentional, so unlike the rest</strong></del></span> <span 
class="inserted"><ins><em>are situations in which Apple employs its power over 
users
+&lt;p&gt;These are situations in which Apple employs its power over users
 to directly intervene in ways that harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When Apple suspects a user</em></ins></span> of <span 
class="inserted"><ins><em>fraud, it
-    judges</em></ins></span> the <span class="removed"><del><strong>file
-  they</strong></del></span> <span class="inserted"><ins><em>case secretly and 
presents the verdict
-    as a fait accompli.  The punishment to a user found guilty &lt;a
-    
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
-    being cut off for life, which more-or-less cripples the user's Apple
-    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
+    &lt;p&gt;When</em></ins></span> Apple <span 
class="removed"><del><strong>used its censorship system</strong></del></span> 
<span class="inserted"><ins><em>suspects a user of fraud, it
+    judges the case secretly and presents the verdict
+    as a fait accompli.  The punishment</em></ins></span> to <span 
class="removed"><del><strong>enforce
+China's censorship</strong></del></span> <span class="inserted"><ins><em>a 
user found guilty</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by
+blocking distribution of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
+    being cut off for life, which more-or-less cripples</em></ins></span> the 
<span class="removed"><del><strong>New York Times 
app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's</em></ins></span> Apple <span 
class="removed"><del><strong>censors
+games,</strong></del></span>
+    <span class="inserted"><ins><em>devices forever&lt;/a&gt;.  There is no 
appeal.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810240"&gt;
-    &lt;p&gt;Apple and Samsung deliberately &lt;a
-    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
-    the performance of older phones to force users to buy their newer
-    phones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple and Samsung deliberately</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
+    the <span class="removed"><del><strong>cr&hellip;app store&lt;/a&gt; 
because</strong></del></span> <span 
class="inserted"><ins><em>performance</em></ins></span> of <span 
class="removed"><del><strong>which political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>older phones to force users to buy their newer
+    phones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201805310"&gt;
-    &lt;p&gt;Apple has &lt;a
-    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+Apple</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201805310"&gt;
+    &lt;p&gt;Apple has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+banned a program</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram</em></ins></span> from <span class="removed"><del><strong>the App 
Store&lt;/a&gt; because</strong></del></span> <span 
class="inserted"><ins><em>upgrading</em></ins></span> its <span 
class="removed"><del><strong>developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple rejected an</strong></del></span> app <span 
class="removed"><del><strong>that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After the fifth rejection,</strong></del></span> <span 
class="inserted"><ins><em>for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to</em></ins></span> do <span 
class="inserted"><ins><em>with Russia's command to Apple to block
+    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple <span class="inserted"><ins><em>to block
     Telegram in Russia.&lt;/p&gt;
 
-    &lt;p&gt;The Telegram client is free software on other platforms, 
but</em></ins></span> not <span class="removed"><del><strong>count as malware. 
We mention them</strong></del></span> <span class="inserted"><ins><em>on
-    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
-    are jails&lt;/a&gt;, they don't permit any app</em></ins></span> to <span 
class="removed"><del><strong>refute</strong></del></span> <span 
class="inserted"><ins><em>be free software.&lt;/p&gt;
+    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+    iThings. Since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
+    are jails&lt;/a&gt;, they don't permit any</em></ins></span> app <span 
class="removed"><del><strong>based on the subject matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As of 2015, Apple</strong></del></span> <span class="inserted"><ins><em>to be 
free software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
-    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
+rights</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
     changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+    accessed from GNU/Linux, Windows</em></ins></span> or <span 
class="removed"><del><strong>would help women find 
abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;
+This particular political slant</strong></del></span> <span 
class="inserted"><ins><em>even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706060"&gt;
-    &lt;p&gt;Apple will stop &lt;a
-    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
-    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple will stop</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects other Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+
+&lt;p&gt;These</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing</em></ins></span>
+    bugs <span class="removed"><del><strong>are/were not intentional, so 
unlike</strong></del></span> <span class="inserted"><ins><em>for older model 
iThings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's</em></ins></span> the
-  <span class="removed"><del><strong>supposition that 
prestigious</strong></del></span> <span class="inserted"><ins><em>nature 
of</em></ins></span> proprietary <span class="removed"><del><strong>software 
doesn't have grave
+    that's</em></ins></span> the <span 
class="removed"><del><strong>rest</strong></del></span> <span 
class="inserted"><ins><em>nature</em></ins></span> of <span 
class="removed"><del><strong>the file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious</strong></del></span> proprietary <span 
class="removed"><del><strong>software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul&gt;
@@ -678,47 +699,66 @@
     
href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download</em></ins></span>
     a system upgrade
          <span class="removed"><del><strong>&lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without</strong></del></span>
 <span class="inserted"><ins><em>without</em></ins></span> asking the 
users&lt;/a&gt;. Apple did not
-    forcibly install the upgrade but the <span 
class="removed"><del><strong>downloading alone caused lots of trouble.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
-
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple Siri</strong></del></span> <span 
class="inserted"><ins><em>downloading alone caused lots
+    forcibly install the upgrade but the <span 
class="removed"><del><strong>downloading alone caused 
lots</strong></del></span> <span class="inserted"><ins><em>downloading alone 
caused lots
     of trouble.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412040"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
-      about</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods the</em></ins></span> music <span 
class="removed"><del><strong>charts if you're not an</strong></del></span> 
<span class="inserted"><ins><em>that users had got from internet music
+    &lt;p&gt;Apple &lt;a
+    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+    deleted from iPods the music that users had got from internet music
     stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200709270"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
-    An</em></ins></span> Apple <span class="removed"><del><strong>Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>firmware &ldquo;upgrade&rdquo; bricked iPhones that 
had been
+    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
     unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
+    censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="sabotage"&gt;Apple 
Sabotage&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
+&lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201910130"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>wrongs</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &ldquo;Study
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites</em></ins></span> of <span 
class="removed"><del><strong>trouble.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    originating from single IP addresses, the government</em></ins></span> can 
<span class="removed"><del><strong>take advantage of</strong></del></span> 
<span class="inserted"><ins><em>identify
+    dissenters in China and Hong Kong, thus endangering</em></ins></span> 
their <span class="removed"><del><strong>customers by imposing arbitrary 
limits</strong></del></span> <span class="inserted"><ins><em>lives.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
     the Great Nation&rdquo; app requires users to grant it &lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
+    access</em></ins></span> to <span class="removed"><del><strong>their use 
of</strong></del></span> the <span class="removed"><del><strong>software.  This 
section reports examples of hard sell</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, 
contacts,</em></ins></span> and <span class="removed"><del><strong>other unjust 
commercial tactics by Apple.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple Siri
+      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</strong></del></span>
+    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version was found</em></ins></span> to <span 
class="removed"><del><strong>give you information&lt;/a&gt;
+      about music charts if you're not an Apple Music subscriber.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
+
+&lt;p&gt;The wrongs</strong></del></span> <span 
class="inserted"><ins><em>contain a
     back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="inserted"><ins><em>the users'
     phone, as &ldquo;superusers.&rdquo; Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
 not involve making</strong></del></span>
@@ -1177,7 +1217,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/21 07:00:13 $
+$Date: 2019/10/31 12:01:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-apple.it.po 21 Oct 2019 07:00:13 -0000      1.142
+++ malware-apple.it.po 31 Oct 2019 12:01:57 -0000      1.143
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1270,6 +1270,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- malware-apple.ja-diff.html  21 Oct 2019 07:00:13 -0000      1.74
+++ malware-apple.ja-diff.html  31 Oct 2019 12:01:57 -0000      1.75
@@ -191,67 +191,92 @@
 &lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
-As</strong></del></span> <span class="inserted"><ins><em>system proprietary
-    software &lt;a href="#M201908150"&gt;turns off certain features when 
batteries
-    are replaced other than by Apple.&lt;/a&gt;&lt;/p&gt;
+As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
+rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;
+This particular political slant</strong></del></span> <span 
class="inserted"><ins><em>system proprietary
+    software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects</strong></del></span> <span 
class="inserted"><ins><em>href="#M201908150"&gt;turns off certain features when 
batteries
+    are replaced</em></ins></span> other <span 
class="removed"><del><strong>Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to</strong></del></span> <span class="inserted"><ins><em>than by 
Apple.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704070.1"&gt;
-    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
-    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
+    &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-    Apple uses DRM software to prevent people from charging an iThing
-    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
+    Apple</em></ins></span> uses <span class="removed"><del><strong>this 
API</strong></del></span> <span class="inserted"><ins><em>DRM 
software</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
+    with</em></ins></span> a <span class="removed"><del><strong>certain kind 
of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200811210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-    focuses on the fact that a new model of Macbook introduced a
-    requirement for monitors to have malicious hardware, but DRM software
+    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
+    focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that a new model of Macbook 
introduced</em></ins></span> a
+    <span class="inserted"><ins><em>requirement for monitors to 
have</em></ins></span> malicious <span class="removed"><del><strong>web 
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM 
software
     in MacOS is involved in activating the hardware. The software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-    and said that MacOS would do the same thing subsequently.)&lt;/p&gt;
+    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
+    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same 
thing subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
     &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
     href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
-    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+    customers can watch the videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="incompatibility"&gt;Incompatibility&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
-hinder users from switching to any alternative program&mdash;and, in
+&lt;p&gt;In this section, we list characteristics of Apple</em></ins></span> 
programs <span class="removed"><del><strong>often mess up the user's system. 
They are like sabotage, but they are not grave enough</strong></del></span> 
<span class="inserted"><ins><em>that block or
+hinder users from switching</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>any alternative program&mdash;and, in
 particular, from switching to free software which can liberate the device
 the software runs on.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201803300"&gt;
-    &lt;p&gt;In MacOS and iOS, the procedure for &lt;a
+    &lt;p&gt;In MacOS and iOS, the procedure</em></ins></span> for <span 
class="inserted"><ins><em>&lt;a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-    converting images from the Photos format&lt;/a&gt; to a free format is so
-    tedious and time-consuming that users just give up if they have a
-    lot of them.&lt;/p&gt;
+    converting images from</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</strong></del></span> <span class="inserted"><ins><em>Photos 
format&lt;/a&gt; to a free format is so
+    tedious</em></ins></span> and <span class="removed"><del><strong>wrong. 
This section describes examples</strong></del></span> <span 
class="inserted"><ins><em>time-consuming that users just give up if they have a
+    lot</em></ins></span> of <span class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201802120"&gt;
     &lt;p&gt;Apple devices lock users in &lt;a
     
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely to Apple services&lt;/a&gt; by being designed to be incompatible
+    solely to</em></ins></span> Apple <span 
class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt; by being designed to be 
incompatible
     with all other options, ethical or unethical.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -472,18 +497,14 @@
   &lt;/li&gt;
 
   &lt;li id="M201509230"&gt;
-    &lt;p&gt;As</em></ins></span> of 2015, Apple &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
-    systematically</em></ins></span> bans apps that endorse abortion rights or 
would help
+    &lt;p&gt;As of 2015, Apple &lt;a
+    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+    systematically bans apps that endorse abortion rights or would help
     women find abortions&lt;/a&gt;.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;
-This</strong></del></span>
-
-    <span class="inserted"><ins><em>&lt;p&gt;This</em></ins></span> particular 
political slant &lt;a
+    &lt;p&gt;This particular political slant &lt;a
     
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects other Apple <span class="removed"><del><strong>services&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;
+    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506250"&gt;
@@ -555,48 +576,38 @@
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
     to give you information&lt;/a&gt; about music charts if you're not an Apple
     Music subscriber.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;
+&lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;A vulnerability</strong></del></span> <span 
class="inserted"><ins><em>id="sabotage"&gt;Sabotage&lt;/h3&gt;
-
-&lt;p&gt;These are situations</em></ins></span> in <span 
class="removed"><del><strong>Apple's Image I/O API allowed an attacker
-    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application</strong></del></span> which <span 
class="removed"><del><strong>uses this API</strong></del></span> <span 
class="inserted"><ins><em>Apple employs its power over users</em></ins></span>
-to <span class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>directly intervene in ways that harm them or block 
their work.&lt;/p&gt;
+&lt;p&gt;These are situations in which Apple employs its power over users
+to directly intervene in ways that harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When Apple suspects</em></ins></span> a <span 
class="removed"><del><strong>certain kind</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> of <span 
class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>fraud, it
+    &lt;p&gt;When Apple suspects a user of fraud, it
     judges the case secretly and presents the verdict
     as a fait accompli.  The punishment to a user found guilty &lt;a
     
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
     being cut off for life, which more-or-less cripples the user's Apple
-    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;</em></ins></span>
+    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug in</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810240"&gt;
+  &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
-    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
-    the <span class="removed"><del><strong>iThings Messages
-      app</strong></del></span> <span class="inserted"><ins><em>performance of 
older phones to force users to buy their newer
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805310"&gt;
-    &lt;p&gt;Apple has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>malicious web site</strong></del></span> <span 
class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple has &lt;a
+    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>do with Russia's command to Apple to block
+    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
     Telegram in Russia.&lt;/p&gt;
 
     &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
@@ -607,22 +618,17 @@
   &lt;li id="M201710044"&gt;
     &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
     
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes</em></ins></span> the <span class="removed"><del><strong>user's 
messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>file 
system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of 
MacOS.&lt;/p&gt;</em></ins></span>
+    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201706060"&gt;
+  &lt;li id="M201706060"&gt;
     &lt;p&gt;Apple will stop &lt;a
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's the nature of</em></ins></span> proprietary <span 
class="removed"><del><strong>programs often mess up</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;
+    that's the nature of proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704070"&gt;
@@ -632,8 +638,8 @@
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The article uses</em></ins></span> the <span 
class="removed"><del><strong>user's system. They are like 
sabotage,</strong></del></span> <span class="inserted"><ins><em>term 
&ldquo;lock&rdquo;
-    to describe the DRM,</em></ins></span> but <span 
class="removed"><del><strong>they are not grave enough</strong></del></span> 
<span class="inserted"><ins><em>we prefer</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>use the term &lt;a
+    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
+    to describe the DRM, but we prefer to use the term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
     handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -641,26 +647,22 @@
   &lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-    stops users from fixing the security bugs in Quicktime</em></ins></span> 
for <span class="inserted"><ins><em>Windows&lt;/a&gt;,
+    stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605040"&gt;
     &lt;p&gt;The Apple Music client program &lt;a
-    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
-    the <span class="removed"><del><strong>word &ldquo;sabotage&rdquo;. 
Nonetheless, they are nasty</strong></del></span> <span 
class="inserted"><ins><em>user's file system for music files, copies them to an 
Apple server,</em></ins></span>
-    and <span class="removed"><del><strong>wrong. This section describes 
examples of</strong></del></span> <span class="inserted"><ins><em>deletes 
them&lt;/a&gt;.&lt;/p&gt;
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+    the user's file system for music files, copies them to an Apple server,
+    and deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602050"&gt;
     &lt;p&gt;iOS version 9 for iThings &lt;a
     
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>eventually backed off from this policy under
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
     criticism from the users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
@@ -673,38 +675,51 @@
     forcibly install the upgrade but the downloading alone caused lots
     of trouble.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
-
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple Siri</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201412040"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
-      about</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods the</em></ins></span> music <span 
class="removed"><del><strong>charts if you're not an</strong></del></span> 
<span class="inserted"><ins><em>that users had got from internet music
+    &lt;p&gt;Apple &lt;a
+    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+    deleted from iPods the music that users had got from internet music
     stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200709270"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
-    An</em></ins></span> Apple <span class="removed"><del><strong>Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>firmware &ldquo;upgrade&rdquo; bricked iPhones that 
had been
+    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
     unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="sabotage"&gt;Apple 
Sabotage&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201910130"&gt;</em></ins></span>
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>their use of</strong></del></span> the <span 
class="removed"><del><strong>software.  This section reports 
examples</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites</em></ins></span> of <span 
class="removed"><del><strong>hard sell</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>other unjust commercial tactics by Apple.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple Siri
+      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
+      about music charts if you're not an Apple Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;</em></ins></span>
     &lt;p&gt;The <span 
class="removed"><del><strong>wrongs</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &ldquo;Study
     the Great Nation&rdquo; app requires users to grant it &lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
@@ -1141,7 +1156,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/21 07:00:13 $
+$Date: 2019/10/31 12:01:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- malware-apple.ja.po 21 Oct 2019 07:00:13 -0000      1.125
+++ malware-apple.ja.po 31 Oct 2019 12:01:57 -0000      1.126
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -954,6 +954,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-apple.nl-diff.html  21 Oct 2019 07:00:13 -0000      1.79
+++ malware-apple.nl-diff.html  31 Oct 2019 12:01:57 -0000      1.80
@@ -191,67 +191,92 @@
 &lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
-As</strong></del></span> <span class="inserted"><ins><em>system proprietary
-    software &lt;a href="#M201908150"&gt;turns off certain features when 
batteries
-    are replaced other than by Apple.&lt;/a&gt;&lt;/p&gt;
+As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
+rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;
+This particular political slant</strong></del></span> <span 
class="inserted"><ins><em>system proprietary
+    software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects</strong></del></span> <span 
class="inserted"><ins><em>href="#M201908150"&gt;turns off certain features when 
batteries
+    are replaced</em></ins></span> other <span 
class="removed"><del><strong>Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to</strong></del></span> <span class="inserted"><ins><em>than by 
Apple.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704070.1"&gt;
-    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
-    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
+    &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-    Apple uses DRM software to prevent people from charging an iThing
-    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
+    Apple</em></ins></span> uses <span class="removed"><del><strong>this 
API</strong></del></span> <span class="inserted"><ins><em>DRM 
software</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
+    with</em></ins></span> a <span class="removed"><del><strong>certain kind 
of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200811210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-    focuses on the fact that a new model of Macbook introduced a
-    requirement for monitors to have malicious hardware, but DRM software
+    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
+    focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that a new model of Macbook 
introduced</em></ins></span> a
+    <span class="inserted"><ins><em>requirement for monitors to 
have</em></ins></span> malicious <span class="removed"><del><strong>web 
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM 
software
     in MacOS is involved in activating the hardware. The software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-    and said that MacOS would do the same thing subsequently.)&lt;/p&gt;
+    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
+    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same 
thing subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
     &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
     href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
-    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+    customers can watch the videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="incompatibility"&gt;Incompatibility&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
-hinder users from switching to any alternative program&mdash;and, in
+&lt;p&gt;In this section, we list characteristics of Apple</em></ins></span> 
programs <span class="removed"><del><strong>often mess up the user's system. 
They are like sabotage, but they are not grave enough</strong></del></span> 
<span class="inserted"><ins><em>that block or
+hinder users from switching</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>any alternative program&mdash;and, in
 particular, from switching to free software which can liberate the device
 the software runs on.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201803300"&gt;
-    &lt;p&gt;In MacOS and iOS, the procedure for &lt;a
+    &lt;p&gt;In MacOS and iOS, the procedure</em></ins></span> for <span 
class="inserted"><ins><em>&lt;a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-    converting images from the Photos format&lt;/a&gt; to a free format is so
-    tedious and time-consuming that users just give up if they have a
-    lot of them.&lt;/p&gt;
+    converting images from</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</strong></del></span> <span class="inserted"><ins><em>Photos 
format&lt;/a&gt; to a free format is so
+    tedious</em></ins></span> and <span class="removed"><del><strong>wrong. 
This section describes examples</strong></del></span> <span 
class="inserted"><ins><em>time-consuming that users just give up if they have a
+    lot</em></ins></span> of <span class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201802120"&gt;
     &lt;p&gt;Apple devices lock users in &lt;a
     
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely to Apple services&lt;/a&gt; by being designed to be incompatible
+    solely to</em></ins></span> Apple <span 
class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt; by being designed to be 
incompatible
     with all other options, ethical or unethical.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -472,18 +497,14 @@
   &lt;/li&gt;
 
   &lt;li id="M201509230"&gt;
-    &lt;p&gt;As</em></ins></span> of 2015, Apple &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
-    systematically</em></ins></span> bans apps that endorse abortion rights or 
would help
+    &lt;p&gt;As of 2015, Apple &lt;a
+    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+    systematically bans apps that endorse abortion rights or would help
     women find abortions&lt;/a&gt;.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;
-This</strong></del></span>
-
-    <span class="inserted"><ins><em>&lt;p&gt;This</em></ins></span> particular 
political slant &lt;a
+    &lt;p&gt;This particular political slant &lt;a
     
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects other Apple <span class="removed"><del><strong>services&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;
+    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506250"&gt;
@@ -555,48 +576,38 @@
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
     to give you information&lt;/a&gt; about music charts if you're not an Apple
     Music subscriber.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;
+&lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;A vulnerability</strong></del></span> <span 
class="inserted"><ins><em>id="sabotage"&gt;Sabotage&lt;/h3&gt;
-
-&lt;p&gt;These are situations</em></ins></span> in <span 
class="removed"><del><strong>Apple's Image I/O API allowed an attacker
-    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application</strong></del></span> which <span 
class="removed"><del><strong>uses this API</strong></del></span> <span 
class="inserted"><ins><em>Apple employs its power over users</em></ins></span>
-to <span class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>directly intervene in ways that harm them or block 
their work.&lt;/p&gt;
+&lt;p&gt;These are situations in which Apple employs its power over users
+to directly intervene in ways that harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When Apple suspects</em></ins></span> a <span 
class="removed"><del><strong>certain kind</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> of <span 
class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>fraud, it
+    &lt;p&gt;When Apple suspects a user of fraud, it
     judges the case secretly and presents the verdict
     as a fait accompli.  The punishment to a user found guilty &lt;a
     
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
     being cut off for life, which more-or-less cripples the user's Apple
-    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;</em></ins></span>
+    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug in</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810240"&gt;
+  &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
-    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
-    the <span class="removed"><del><strong>iThings Messages
-      app</strong></del></span> <span class="inserted"><ins><em>performance of 
older phones to force users to buy their newer
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805310"&gt;
-    &lt;p&gt;Apple has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>malicious web site</strong></del></span> <span 
class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple has &lt;a
+    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>do with Russia's command to Apple to block
+    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
     Telegram in Russia.&lt;/p&gt;
 
     &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
@@ -607,22 +618,17 @@
   &lt;li id="M201710044"&gt;
     &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
     
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes</em></ins></span> the <span class="removed"><del><strong>user's 
messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>file 
system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of 
MacOS.&lt;/p&gt;</em></ins></span>
+    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201706060"&gt;
+  &lt;li id="M201706060"&gt;
     &lt;p&gt;Apple will stop &lt;a
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's the nature of</em></ins></span> proprietary <span 
class="removed"><del><strong>programs often mess up</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;
+    that's the nature of proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704070"&gt;
@@ -632,8 +638,8 @@
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The article uses</em></ins></span> the <span 
class="removed"><del><strong>user's system. They are like 
sabotage,</strong></del></span> <span class="inserted"><ins><em>term 
&ldquo;lock&rdquo;
-    to describe the DRM,</em></ins></span> but <span 
class="removed"><del><strong>they are not grave enough</strong></del></span> 
<span class="inserted"><ins><em>we prefer</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>use the term &lt;a
+    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
+    to describe the DRM, but we prefer to use the term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
     handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -641,26 +647,22 @@
   &lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-    stops users from fixing the security bugs in Quicktime</em></ins></span> 
for <span class="inserted"><ins><em>Windows&lt;/a&gt;,
+    stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605040"&gt;
     &lt;p&gt;The Apple Music client program &lt;a
-    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
-    the <span class="removed"><del><strong>word &ldquo;sabotage&rdquo;. 
Nonetheless, they are nasty</strong></del></span> <span 
class="inserted"><ins><em>user's file system for music files, copies them to an 
Apple server,</em></ins></span>
-    and <span class="removed"><del><strong>wrong. This section describes 
examples of</strong></del></span> <span class="inserted"><ins><em>deletes 
them&lt;/a&gt;.&lt;/p&gt;
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+    the user's file system for music files, copies them to an Apple server,
+    and deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602050"&gt;
     &lt;p&gt;iOS version 9 for iThings &lt;a
     
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>eventually backed off from this policy under
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
     criticism from the users. However, it has not acknowledged that this
     was wrong.&lt;/p&gt;
   &lt;/li&gt;
@@ -673,38 +675,51 @@
     forcibly install the upgrade but the downloading alone caused lots
     of trouble.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
-
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple Siri</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201412040"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
-      about</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods the</em></ins></span> music <span 
class="removed"><del><strong>charts if you're not an</strong></del></span> 
<span class="inserted"><ins><em>that users had got from internet music
+    &lt;p&gt;Apple &lt;a
+    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+    deleted from iPods the music that users had got from internet music
     stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200709270"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
-    An</em></ins></span> Apple <span class="removed"><del><strong>Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>firmware &ldquo;upgrade&rdquo; bricked iPhones that 
had been
+    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
     unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="sabotage"&gt;Apple 
Sabotage&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201910130"&gt;</em></ins></span>
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>their use of</strong></del></span> the <span 
class="removed"><del><strong>software.  This section reports 
examples</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites</em></ins></span> of <span 
class="removed"><del><strong>hard sell</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>other unjust commercial tactics by Apple.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple Siri
+      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
+      about music charts if you're not an Apple Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;</em></ins></span>
     &lt;p&gt;The <span 
class="removed"><del><strong>wrongs</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &ldquo;Study
     the Great Nation&rdquo; app requires users to grant it &lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
@@ -1141,7 +1156,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/21 07:00:13 $
+$Date: 2019/10/31 12:01:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- malware-apple.nl.po 21 Oct 2019 07:00:13 -0000      1.80
+++ malware-apple.nl.po 31 Oct 2019 12:01:57 -0000      1.81
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -930,6 +930,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- malware-apple.pot   21 Oct 2019 07:00:13 -0000      1.90
+++ malware-apple.pot   31 Oct 2019 12:01:57 -0000      1.91
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -763,6 +763,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a "
+"href=\"https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\";>
 "
+"sends browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to "
+"&ldquo;fraudulent&rdquo; websites. Since Tencent collaborates with the "
+"Chinese government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a "
 
"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\";>
 "

Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- malware-apple.ru.po 21 Oct 2019 12:00:35 -0000      1.232
+++ malware-apple.ru.po 31 Oct 2019 12:01:57 -0000      1.233
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2019-01-29 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -1087,6 +1088,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- nl.po       30 Oct 2019 17:00:14 -0000      1.156
+++ nl.po       31 Oct 2019 12:01:57 -0000      1.157
@@ -1558,6 +1558,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- pl.po       30 Oct 2019 17:00:15 -0000      1.155
+++ pl.po       31 Oct 2019 12:01:57 -0000      1.156
@@ -1278,6 +1278,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- pot 30 Oct 2019 17:00:15 -0000      1.154
+++ pot 31 Oct 2019 12:01:57 -0000      1.155
@@ -1135,6 +1135,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary-surveillance.de-diff.html       19 Oct 2019 10:32:22 -0000      
1.100
+++ proprietary-surveillance.de-diff.html       31 Oct 2019 12:01:58 -0000      
1.101
@@ -646,7 +646,13 @@
     to
       <span class="removed"><del><strong>users' text messages.&lt;/dd&gt;
 
-    &lt;dt&gt;DroidVPN</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN 
developers</strong></del></span> have <span 
class="removed"><del><strong>confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
+      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -657,63 +663,121 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China</em></ins></span> to the 
<span class="removed"><del><strong>UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>the
+      users. The stated purpose of the JS injection is</strong></del></span> 
<span class="inserted"><ins><em>check URLs that possibly 
correspond</em></ins></span> to <span class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;fraudulent&rdquo; websites. Since 
Tencent collaborates
+    with</em></ins></span> the
+      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed that</strong></del></span> <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most 
certainly
+    contains</em></ins></span> the <span 
class="removed"><del><strong>non-premium version</strong></del></span> <span 
class="inserted"><ins><em>websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the 
<span class="removed"><del><strong>app does
+      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>requests
+    originating from single IP addresses, the government can identify
+    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>Hong Kong, 
thus endangering their lives.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>the top-ranked gratis
+  proprietary Android</strong></del></span> <span 
class="inserted"><ins><em>Apple's supposed commitment to
+    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>contain trackers that are busy at night &lt;a
     
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+    sending users' personal information to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    &lt;p&gt;The article <span class="removed"><del><strong>confusingly 
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions 
specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
+    and DoorDash. But it is likely that most nonfree</em></ins></span> apps 
<span class="inserted"><ins><em>contain
+    trackers. Some of these send personally identifying data 
such</em></ins></span> as <span class="removed"><del><strong>&ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
+    delivery address (in the case</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
+    is collected by</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
+  for that word</strong></del></span> <span class="inserted"><ins><em>company, 
there</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that</strong></del></span> <span class="inserted"><ins><em>no telling what 
it</em></ins></span> will <span class="removed"><del><strong>fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201709210"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be 
spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702150"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="removed"><del><strong>transmit users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
+    no way</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
-    them from there.&lt;/p&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots</em></ins></span> of <span class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    them from there.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
+    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>on iThings</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number</em></ins></span> that <span 
class="removed"><del><strong>install</strong></del></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span>
+    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's 
servers all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -887,7 +951,7 @@
 
     &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
     legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    reading the &ldquo;Terms</em></ins></span> and Conditions&rdquo; that 
<span class="removed"><del><strong>spell out</strong></del></span> <span 
class="inserted"><ins><em>spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
     honestly identify the information it collects on users, instead of
     hiding it in an obscurely worded EULA.&lt;/p&gt;
@@ -1281,8 +1345,7 @@
 
   &lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software in popular Android apps
-    is pervasive</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>sometimes very clever. Some trackers can &lt;a
+    is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
@@ -1292,80 +1355,47 @@
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>words
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to <span class="removed"><del><strong>read logs
-      for other</strong></del></span> <span class="inserted"><ins><em>zero 
price.&lt;/p&gt;
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android</em></ins></span> apps <span 
class="inserted"><ins><em>recorded &lt;a
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls</em></ins></span> and <span class="removed"><del><strong>also core 
system logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
-      and may turn</strong></del></span> <span 
class="inserted"><ins><em>sent</em></ins></span> them <span 
class="removed"><del><strong>over</strong></del></span> <span 
class="inserted"><ins><em>and text messages and emails</em></ins></span> to 
<span class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; 
on</em></ins></span> the <span class="removed"><del><strong>UK government if
-      requested.&lt;/dd&gt;
-
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>contrary, it
-    worked in various ways</em></ins></span> to <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+    for the snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>JS 
injection is to display
-      ads. Uses roughly 5 tracking libraries. Also, it redirects the
-      user's traffic through valueclick.com (an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice</em></ins></span> of <span class="removed"><del><strong>this 
app</strong></del></span> <span class="inserted"><ins><em>their being
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google</em></ins></span> have
-      <span class="removed"><del><strong>confirmed that the non-premium 
version</strong></del></span> <span class="inserted"><ins><em>done a better 
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
+    &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>app does
-      JavaScript injection</strong></del></span> <span 
class="inserted"><ins><em>source code</em></ins></span> for <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>these apps,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A</strong></del></span>
 study
-    <span class="inserted"><ins><em>the source code somehow to determine 
whether they mistreat users</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt; found that 90%</strong></del></span>
-    <span class="inserted"><ins><em>various ways. If it did a good 
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or 
less
-    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>app developers are 
clever
-    enough to outsmart</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
-
-    &lt;p&gt;But since Google itself develops malicious</em></ins></span> 
apps, <span class="removed"><del><strong>it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most</strong></del></span> <span class="inserted"><ins><em>we cannot 
trust
-    Google to protect us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span class="inserted"><ins><em>source 
code to</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    to inspect executable proprietary apps to see</em></ins></span> what they 
<span class="inserted"><ins><em>do.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;</em></ins></span>
-    &lt;p&gt;Apps for BART &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop</em></ins></span> on users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers</em></ins></span> 
are <span class="removed"><del><strong>&ldquo;consenting&rdquo; 
to.</strong></del></span> <span class="inserted"><ins><em>clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+    &lt;p&gt;But since</em></ins></span> Google <span 
class="removed"><del><strong>should clearly
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
@@ -1373,14 +1403,11 @@
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;</em></ins></span>
+  &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV <span 
class="removed"><del><strong>programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
@@ -1397,74 +1424,61 @@
     along with the headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    If</em></ins></span> the <span class="removed"><del><strong>information it 
collects on users, instead</strong></del></span> <span 
class="inserted"><ins><em>fine print</em></ins></span> of <span 
class="removed"><del><strong>hiding</strong></del></span> <span 
class="inserted"><ins><em>the app said that users gave consent for this,
+    would that make</em></ins></span> it <span class="removed"><del><strong>in 
an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>truly protect 
people's privacy, we must prevent Google
+and other companies from getting this personal information 
in</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
+    the <span class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app to 
snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;</em></ins></span>
-    &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
-    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>Android apps can collude
+    to transmit users' personal data to servers.</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+  &lt;li id="M201703300"&gt;
+    &lt;p&gt;Verizon &lt;a
+    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
+    about</em></ins></span> the users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
-    &lt;p&gt;Verizon</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>it will&lt;/a&gt; pre-install
-    on some</em></ins></span> of <span class="removed"><del><strong>users is 
not enough
-to legitimize actions like this.  At this point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>its 
phones. The app will give Verizon</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>same 
information
-    about the users' searches</em></ins></span> that <span 
class="removed"><del><strong>spell out
-what they are &ldquo;consenting&rdquo; to.</strong></del></span> Google <span 
class="removed"><del><strong>should clearly
-and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>normally gets when they use
+    &lt;p&gt;Even if you disable</strong></del></span> <span 
class="inserted"><ins><em>searches that</em></ins></span> Google <span 
class="removed"><del><strong>Maps</strong></del></span> <span 
class="inserted"><ins><em>normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>app is &lt;a
+    &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>only one 
phone&lt;/a&gt;,</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in</strong></del></span> the 
<span class="removed"><del><strong>first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>user must
-    explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>spyware is
+    being pre-installed on only one phone&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>location tracking, you</strong></del></span> 
<span class="inserted"><ins><em>the user</em></ins></span> must
+    <span class="removed"><del><strong>disable Google Play itself to 
completely stop</strong></del></span>
+    <span class="inserted"><ins><em>explicitly opt-in before</em></ins></span> 
the <span class="removed"><del><strong>tracking.  This is
+    yet another example</strong></del></span> <span 
class="inserted"><ins><em>app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>nonfree software 
pretending</strong></del></span> <span class="inserted"><ins><em>spyware is
     still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Meitu photo-editing app &lt;a
+    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user data</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app</em></ins></span> tracks <span 
class="removed"><del><strong>the users'</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'</em></ins></span>
-    movements <span class="removed"><del><strong>without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>before</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
-    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
-    yet another</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Uber app tracks &lt;a
+    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>user,
+    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> example <span 
class="removed"><del><strong>of nonfree software pretending to 
obey</strong></del></span> <span class="inserted"><ins><em>illustrates how 
&ldquo;getting</em></ins></span> the <span class="removed"><del><strong>user,
-    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>user's
+    &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
     unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protection against
     massive surveillance.&lt;/p&gt;</em></ins></span>
@@ -3601,7 +3615,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:32:22 $
+$Date: 2019/10/31 12:01:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- proprietary-surveillance.de.po      19 Oct 2019 10:32:22 -0000      1.315
+++ proprietary-surveillance.de.po      31 Oct 2019 12:01:58 -0000      1.316
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1237,6 +1237,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary-surveillance.es.po      20 Oct 2019 10:34:29 -0000      1.9
+++ proprietary-surveillance.es.po      31 Oct 2019 12:01:58 -0000      1.10
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2019-10-20 12:12+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -904,6 +905,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.482
retrieving revision 1.483
diff -u -b -r1.482 -r1.483
--- proprietary-surveillance.fr.po      21 Oct 2019 09:29:41 -0000      1.482
+++ proprietary-surveillance.fr.po      31 Oct 2019 12:01:58 -0000      1.483
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2019-10-21 11:28+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -902,6 +903,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary-surveillance.it-diff.html       19 Oct 2019 10:32:22 -0000      
1.167
+++ proprietary-surveillance.it-diff.html       31 Oct 2019 12:01:58 -0000      
1.168
@@ -633,14 +633,10 @@
     &lt;p&gt;Even if you disable Google Maps and</strong></del></span> <span 
class="inserted"><ins><em>GPS</em></ins></span> location <span 
class="removed"><del><strong>tracking, you must
     disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
     yet another example of nonfree software pretending</strong></del></span>
-    <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones</em></ins></span>
-    to <span class="removed"><del><strong>obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;</em></ins></span>
+    <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones
+    to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -649,31 +645,49 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>the most popular Android</strong></del></span> 
<span class="inserted"><ins><em>Apple's supposed commitment to
-    privacy, iPhone</em></ins></span> apps <span 
class="inserted"><ins><em>contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable</strong></del></span> <span class="inserted"><ins><em>Tencent 
Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent 
collaborates</em></ins></span>
+    with <span class="removed"><del><strong>free software.&lt;/p&gt;
+
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>the app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;More than 73% of</strong></del></span> the <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black 
list</em></ins></span> most <span class="removed"><del><strong>popular Android 
apps
+  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly
+    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering</em></ins></span> 
their <span class="removed"><del><strong>users with third 
parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>lives.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;The article <span class="removed"><del><strong>should not have 
described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify,</em></ins></span> The <span 
class="removed"><del><strong>clear way to say
-  &ldquo;zero price&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>the app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;The article takes for granted</strong></del></span> <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="inserted"><ins><em>most nonfree apps contain
+  &lt;p&gt;The article should not have described these</strong></del></span>
+    <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps 
<span class="removed"><del><strong>as
+  &ldquo;free&rdquo;&mdash;they</strong></del></span> <span 
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span 
class="removed"><del><strong>not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>busy at night &lt;a
+    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>say
+  &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The article <span class="removed"><del><strong>takes for granted 
that</strong></del></span> <span class="inserted"><ins><em>mentions specific 
examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM),</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+    and DoorDash. But it</em></ins></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers 
have</strong></del></span> <span class="inserted"><ins><em>most nonfree apps 
contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but</strong></del></span> <span class="inserted"><ins><em>case 
of DoorDash). Once this information
-    is collected by the company, there</em></ins></span> is <span 
class="removed"><del><strong>that valid?  Software developers 
have</strong></del></span> no <span class="removed"><del><strong>right to
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is</em></ins></span> no <span 
class="removed"><del><strong>right to
   analyze</strong></del></span> <span 
class="inserted"><ins><em>telling</em></ins></span> what <span 
class="removed"><del><strong>users are doing or how.  &ldquo;Analytics&rdquo; 
tools that snoop are
   just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it will be
     used for.&lt;/p&gt;</em></ins></span>
@@ -689,16 +703,16 @@
     this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola phones modify Android to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
       send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a
-      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -834,21 +848,22 @@
   <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or it
-    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps the NSA snoop on all the data in an iThing, or 
it</em></ins></span>
+    is <span class="inserted"><ins><em>totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also &lt;a
-    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    &lt;p&gt;The iThing</em></ins></span> also <span 
class="removed"><del><strong>a feature for web sites to track users, which 
is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
+    enabled</em></ins></span> by default&lt;/a&gt;.  (That article talks about 
iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
@@ -862,12 +877,12 @@
       turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
+  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
     to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+    email address</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
@@ -896,55 +911,56 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
+      by sending hidden text messages which enable them to 
turn</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what</em></ins></span> the <span class="removed"><del><strong>phones
+      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>track location even while
-    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>location data 
while in
+    &lt;p&gt;An Android phone was observed</em></ins></span> to <span 
class="inserted"><ins><em>track location even while
+    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data,</em></ins></span> and <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>data,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned</em></ins></span> 
off, <span class="removed"><del><strong>listen to</strong></del></span> <span 
class="inserted"><ins><em>even when</em></ins></span>
-    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the <span class="removed"><del><strong>contact list. This malware is 
designed to
+      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable</em></ins></span> phones <span 
class="removed"><del><strong>come with</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they send so much</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
+    that users can't delete&lt;/a&gt;, and they send so much data 
that</em></ins></span> their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
     of some
@@ -952,18 +968,18 @@
 
   &lt;li&gt;&lt;p&gt;A Motorola phone
       &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;</em></ins></span>
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+  &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+    Samsung's back door&lt;/a&gt; provides access to any file 
on</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The 
Wall</em></ins></span> Street
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in Android phones (and Windows? 
laptops): The Wall Street
     Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
@@ -973,89 +989,144 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:</strong></del></span>
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices when they are
+    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
+      the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable 
phones</strong></del></span>
+    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone &lt;a
-    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal data 
in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>that it will&lt;/a&gt;
+        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>developers &lt;a
     
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+    the personal details</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give 
Verizon</strong></del></span> <span class="inserted"><ins><em>users that 
install</em></ins></span> the <span class="removed"><del><strong>same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="removed"><del><strong>Google normally gets 
when</strong></del></span> <span class="inserted"><ins><em>spell out 
what</em></ins></span>
+    they <span class="removed"><del><strong>use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>are &ldquo;consenting&rdquo; to.  Google should 
clearly</em></ins></span> and
+    <span class="inserted"><ins><em>honestly identify</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>information it collects</em></ins></span> on 
<span class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>users, instead</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span>
+    <span class="inserted"><ins><em>hiding it</em></ins></span> in <span 
class="removed"><del><strong>the phone,</strong></del></span> <span 
class="inserted"><ins><em>an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="inserted"><ins><em>not 
enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>use of 
data on</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>collects on users, instead of
-    hiding</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</em></ins></span>
+    and <span class="inserted"><ins><em>other companies from getting this 
personal information</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for surveillance is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other</strong></del></span> 
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
+    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general</em></ins></span> surveillance <span 
class="removed"><del><strong>software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various 
sites</strong></del></span> <span 
class="inserted"><ins><em>package</em></ins></span> such as <span 
class="removed"><del><strong>Facebook, Google+ and 
Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Carrier IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app
+      &lt;a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
     sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries, &lt;a
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>picture you take 
according</strong></del></span> <span class="inserted"><ins><em>e-reader used 
by most US libraries, &lt;a
     
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send</em></ins></span> lots of <span 
class="removed"><del><strong>surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal</strong></del></span> 
data <span class="inserted"><ins><em>to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>who
+      is</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Kindle: &lt;a
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database,</strong></del></span> <span 
class="inserted"><ins><em>Kindle: &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    report even</em></ins></span> which <span 
class="removed"><del><strong>means the pictures are likely to be
+      sent across</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -1072,25 +1143,27 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
-
-    &lt;p&gt;The fact</em></ins></span> that <span 
class="inserted"><ins><em>this is used for repression of forbidden sharing
-    makes</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span class="removed"><del><strong>its phones. The 
app will give Verizon</strong></del></span> <span 
class="inserted"><ins><em>nonfree software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
-    paying for</em></ins></span> the <span class="removed"><del><strong>users' 
searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="removed"><del><strong>Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less nasty.&lt;/p&gt;
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
+      anymore,</strong></del></span> <span 
class="inserted"><ins><em>money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>injustice of nonfree 
software. It may avoid
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1099,368 +1172,316 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="inserted"><ins><em>Great Nation&rdquo;</em></ins></span> 
app <span class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>requires users to grant it</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant</em></ins></span> it 
&lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>phone's 
microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>Android version was found to contain a
-    back-door allowing developers to run any code they wish 
in</em></ins></span> the <span class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
-    app <span class="removed"><del><strong>remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> is
-    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
-  &lt;/li&gt;
+    access</em></ins></span> to <span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>the 
phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting to realize that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> the <span 
class="removed"><del><strong>&lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>Android version was found to 
contain</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span>
+    <span class="inserted"><ins><em>back-door allowing 
developers</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether</strong></del></span> <span class="inserted"><ins><em>run any 
code</em></ins></span> they <span class="removed"><del><strong>want that. 
This</strong></del></span> <span class="inserted"><ins><em>wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app</em></ins></span> is <span class="removed"><del><strong>a typical 
example</strong></del></span> <span class="inserted"><ins><em>mandatory at some 
workplaces.&lt;/p&gt;
+
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version</em></ins></span> of the <span 
class="removed"><del><strong>attitude of the proprietary software industry 
towards
+      those they have subjugated.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span> <span class="inserted"><ins><em>mandatory at some 
workplaces.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+    apps the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a clarification
+    saying</em></ins></span> that <span class="removed"><del><strong>at least 
is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application 
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes 
a clarification
-    saying that the tests were</em></ins></span> only
-  <span class="removed"><del><strong>can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>performed</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>the Android version</em></ins></span>
-    of <span class="removed"><del><strong>data in</strong></del></span> the 
<span class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>app,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this kind of
+  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed</em></ins></span> on the 
<span class="removed"><del><strong>user&lt;/a&gt;. This is in addition to
+      the snooping done by the phone company, and perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>Android version</em></ins></span>
+    of <span class="removed"><del><strong>whether</strong></del></span> the 
<span class="removed"><del><strong>app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>app, and 
that, according</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple, 
&ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
+    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>tracks</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;,</em></ins></span> after 
<span class="inserted"><ins><em>tricking them
-    into giving</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> app <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when</em></ins></span> it <span 
class="removed"><del><strong>asked the user to
+      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>is turned off&lt;/a&gt;, after tricking them
+    into giving</em></ins></span> the app <span 
class="removed"><del><strong>developer but did not
+      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
+      weakness</strong></del></span> <span class="inserted"><ins><em>use 
one</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app</strong></del></span> <span class="inserted"><ins><em>its
+    functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span> app 
<span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;</em></ins></span>
+    send <span class="removed"><del><strong>any 
information</strong></del></span> <span class="inserted"><ins><em>intimate 
details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such as Facebook, Google+</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>Twitter.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app</strong></del></span> 
<span class="inserted"><ins><em>Maya</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you to share the picture you take 
according</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of</em></ins></span> who <span 
class="inserted"><ins><em>downloads a proprietary
-    program</em></ins></span> is <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a</em></ins></span>
+    proprietary <span class="removed"><del><strong>GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>program for 
adjusting a certain telescopic rifle sight.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>list of all</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
+  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not</em></ins></span> be
-      <span class="removed"><del><strong>sent across the 
wire</strong></del></span> <span class="inserted"><ins><em>a list of who has 
installed
+    &lt;p&gt;With a free program there would not be a list of who has installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
-    of <span class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>operating system, in 
order</em></ins></span> to <span class="inserted"><ins><em>gather as much 
private data as
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="inserted"><ins><em>privacy-enhancing features
+    of</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>operating 
system, in order</em></ins></span> to <span class="removed"><del><strong>spy 
through it too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software we run.&lt;/p&gt;</em></ins></span>
+    having control over the software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span>
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to <span class="removed"><del><strong>increased 
snooping&lt;/a&gt;, and some
-      are starting</strong></del></span> <span class="inserted"><ins><em>allow 
them access</em></ins></span> to <span class="removed"><del><strong>realize 
that it is nasty.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>article shows 
the</strong></del></span> <span class="inserted"><ins><em>involves an 
apparently unintentional weakness in Android,
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping</strong></del></span>
+  &lt;li id="M201905300"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too,</em></ins></span> as <span 
class="inserted"><ins><em>you must expect from nonfree
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> proprietary <span 
class="removed"><del><strong>apps for mobile devices report which other
-    apps</strong></del></span> <span class="inserted"><ins><em>phone 
app&lt;/a&gt; to be allowed into</em></ins></span>
-    the <span class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>event.&lt;/p&gt;
+    requirement</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
 
-    &lt;p&gt;This app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>at least is visible</strong></del></span> <span 
class="inserted"><ins><em>can snoop on a lot of
-    sensitive data, including user's location</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
+    the <span class="removed"><del><strong>toys with</strong></del></span> 
<span class="inserted"><ins><em>event.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This app is</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
+      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>lot of
+    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>even speak
+      into</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on 
the user&lt;/a&gt;. This</strong></del></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily</em></ins></span> be <span 
class="removed"><del><strong>distracted by</strong></del></span>
-    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;The app was reporting the temperature of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>vibrator minute 
by
+      minute (thus, indirectly, whether</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="removed"><del><strong>was 
surrounded by a person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>can easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>woman 
who uses</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
+      standard with which manufacturers would</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>statements about</strong></del></span> their <span 
class="removed"><del><strong>products, rather than free software which users 
could have
+      checked and changed.&lt;/p&gt;
 
-      &lt;p&gt;The FTC criticized this</strong></del></span> <span 
class="inserted"><ins><em>women's rights to equal employment
-    and freedom to make their own pregnancy choices. Don't use
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>own pregnancy choices. Don't use
     these apps, even if someone offers you a reward to do so. A
-    free-software</em></ins></span> app <span 
class="removed"><del><strong>because it asked</strong></del></span> <span 
class="inserted"><ins><em>that does more or less</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>same thing without
-    spying on you is available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    free-software app</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>does more or less</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    &lt;p&gt;Google tracks the movements</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android 
phones and iPhones
     running Goggle apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+    saves</em></ins></span> the data <span class="removed"><del><strong>may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>a
+      data broker,</strong></del></span> <span class="inserted"><ins><em>be 
responsible for sending</em></ins></span>
+    the <span class="inserted"><ins><em>location</em></ins></span> data <span 
class="removed"><del><strong>broker would have been able to figure out
+      who the user was.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to
-      <span class="removed"><del><strong>approve</strong></del></span> <span 
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span 
class="removed"><del><strong>personal</strong></del></span>
-    <span class="inserted"><ins><em>the location</em></ins></span> data to 
<span class="inserted"><ins><em>Google.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total of 
C$4m&lt;/a&gt;</strong></del></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come</em></ins></span> with <span 
class="removed"><del><strong>microphones</strong></del></span> <span 
class="inserted"><ins><em>a huge number of</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="inserted"><ins><em>sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>data, or pass</em></ins></span> it <span 
class="inserted"><ins><em>on</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have access to
-    the network but no direct access to the data.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>results in massive
-    surveillance on which</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
+    the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span class="inserted"><ins><em>data, or 
pass it on</em></ins></span> to <span class="inserted"><ins><em>user-installed 
apps that have</em></ins></span> access <span 
class="inserted"><ins><em>to</em></ins></span>
+    the <span class="removed"><del><strong>data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to</em></ins></span> the 
<span class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
+    surveillance on which</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen to these 
conversations</strong></del></span> <span class="inserted"><ins><em>user has 
absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;</em></ins></span>
-    send <span class="inserted"><ins><em>sensitive personal data to third 
parties&lt;/a&gt;, which can use it
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. 
In</em></ins></span> any <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>case,
-    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>GeForce Experience</strong></del></span>
-    <span class="inserted"><ins><em>library for building mobile apps, which 
also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
-    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>personal
-    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's</strong></del></span> <span class="inserted"><ins><em>Facebook as 
well.&lt;/p&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
 
     &lt;p&gt;It shows that no one can trust a nonfree program, not even the
     developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives</em></ins></span> information on 
&lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use</em></ins></span> and <span 
class="removed"><del><strong>i-Que</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%)</em></ins></span> 
transmit 
-      <span class="removed"><del><strong>&lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>listen in on a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by
-      <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in no 
hurry to take action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users could</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps</em></ins></span> have
-      <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued</strong></del></span> <span class="inserted"><ins><em>a 
surveillance feature</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>a
-      data broker, the data broker would have been able</strong></del></span>
-    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as &lt;a
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them</em></ins></span> to <span class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>phishing sites 
that stole their credentials. Furthermore,</em></ins></span>
-    the user <span class="removed"><del><strong>was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>interface of most of them was 
designed</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
-    there is no easy way</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>150 most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws 
were</em></ins></span>
-    found <span class="inserted"><ins><em>as well.&lt;/p&gt;
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover,</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>previous investigation had found that &lt;a
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
     href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
     the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
@@ -1472,33 +1493,21 @@
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected by</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>users 
of what it will do
-    with</em></ins></span> the <span class="removed"><del><strong>manufacturer 
and</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.&lt;/p&gt;
 
-    &lt;p&gt;We think that lawsuit is about a side issue. 
What</em></ins></span> the <span class="removed"><del><strong>FBI could listen 
to these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children</strong></del></span> <span 
class="inserted"><ins><em>company does
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+  &lt;li id="M201812290"&gt;
     &lt;p&gt;Around 40% of gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
     report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
@@ -2101,7 +2110,7 @@
     report everything that is viewed on them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
     the TV reports what it is. The existence of a way to disable the
-    surveillance, even if it were not hidden as it was in these TVs,
+    surveillance, even if it were not hidden as it</em></ins></span> was <span 
class="removed"><del><strong>unacceptable</strong></del></span> <span 
class="inserted"><ins><em>in these TVs,
     does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2154,7 +2163,7 @@
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>its TVs snoop on what
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2165,7 +2174,9 @@
     Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    &lt;p&gt;Speech recognition is not to be trusted unless it is 
done</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
@@ -2194,23 +2205,23 @@
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>place new items</strong></del></span> 
<span class="inserted"><ins><em>report what the
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
     user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
     reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>other devices on the user's local 
network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
-    product could spy this way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="inserted"><ins><em>stop this, but any
+    product could</em></ins></span> spy <span class="inserted"><ins><em>this 
way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
@@ -2220,10 +2231,14 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found a way to break security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
+    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
+
+
+<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
 
 
 &lt;div <span class="removed"><del><strong>class="big-section"&gt;
@@ -3359,7 +3374,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:32:22 $
+$Date: 2019/10/31 12:01:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- proprietary-surveillance.it.po      19 Oct 2019 10:32:23 -0000      1.328
+++ proprietary-surveillance.it.po      31 Oct 2019 12:01:58 -0000      1.329
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1216,6 +1216,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary-surveillance.ja-diff.html       19 Oct 2019 10:32:23 -0000      
1.183
+++ proprietary-surveillance.ja-diff.html       31 Oct 2019 12:01:58 -0000      
1.184
@@ -629,34 +629,48 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span>
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>personal data to</strong></del></span> Apple's 
<span class="removed"><del><strong>servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing</em></ins></span> data <span 
class="removed"><del><strong>to Apple's servers&lt;/a&gt;.  Big Brother can
+        get them</strong></del></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number</strong></del></span> <span 
class="inserted"><ins><em>supposed commitment to
-    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>the user types into it&lt;/a&gt;; the server 
records these numbers for</strong></del></span> <span 
class="inserted"><ins><em>are busy</em></ins></span> at <span 
class="removed"><del><strong>least 30
+        a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
         days.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving the code Apple
-      sends to it.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Users cannot make an</strong></del></span> Apple <span 
class="removed"><del><strong>ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>devices in China</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
the <span class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with</em></ins></span> the <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list</em></ins></span> most <span 
class="removed"><del><strong>popular iOS apps
+  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly
+    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering</em></ins></span> 
their <span class="removed"><del><strong>users with</strong></del></span> <span 
class="inserted"><ins><em>lives.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    sending users' personal information to</em></ins></span> third <span 
class="removed"><del><strong>parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM),</em></ins></span> the <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that</em></ins></span> most <span 
class="removed"><del><strong>popular iOS</strong></del></span> <span 
class="inserted"><ins><em>nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>contain
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
     delivery address (in the case of DoorDash). Once this information
@@ -665,16 +679,15 @@
   &lt;/li&gt;
 
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
     illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth the obvious way &lt;a
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
@@ -692,7 +705,7 @@
   &lt;li id="M201611170"&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span class="removed"><del><strong>their users 
with third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -762,7 +775,7 @@
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
@@ -779,7 +792,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
+    &lt;p&gt;There is also a feature</em></ins></span> for web sites to track 
users, which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
@@ -829,55 +842,55 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
+      by sending hidden text messages which enable them to 
turn</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what</em></ins></span> the <span class="removed"><del><strong>phones
+      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>track location even while
-    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>location data 
while in
+    &lt;p&gt;An Android phone was observed</em></ins></span> to <span 
class="inserted"><ins><em>track location even while
+    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data,</em></ins></span> and <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>data,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned</em></ins></span> 
off, <span class="removed"><del><strong>listen to</strong></del></span> <span 
class="inserted"><ins><em>even when</em></ins></span>
-    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the <span class="removed"><del><strong>contact list. This malware is 
designed to
+      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable</em></ins></span> phones <span 
class="removed"><del><strong>come</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
+    sold</em></ins></span> with <span class="inserted"><ins><em>spyware 
sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
+    &lt;p&gt;Google Play (a component of Android)</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
+    that users can't delete&lt;/a&gt;, and they</em></ins></span> send so much 
data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
     of some
@@ -967,18 +980,19 @@
   &lt;li id="M201603080"&gt;
     &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+  &lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>user's consent&rdquo;
+        for surveillance is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>e-reader used by most US 
libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
       all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
     send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
@@ -989,10 +1003,10 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
     &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on</strong></del></span>
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page the user reads at</em></ins></span> what <span 
class="removed"><del><strong>radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+    report even which page the user reads at</em></ins></span> what <span 
class="removed"><del><strong>users post on various sites 
       such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1198,16 +1212,27 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</strong></del></span> <span 
class="inserted"><ins><em>that does more or less</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage to spy through it 
too&lt;/a&gt;.
-      Here's information</strong></del></span> <span 
class="inserted"><ins><em>same thing without
-    spying</em></ins></span> on <span class="inserted"><ins><em>you is 
available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>that does more 
or less the same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Goggle apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data</em></ins></span> for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
       More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
@@ -1222,52 +1247,41 @@
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is</em></ins></span> being <span 
class="removed"><del><strong>sued for collecting lots</strong></del></span> 
<span class="inserted"><ins><em>developed&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-    people use it&lt;/a&gt;.&lt;/p&gt;
-
-       &lt;p&gt;The company's statement that it 
anonymizes</strong></del></span> <span class="inserted"><ins><em>Android phones 
and iPhones
-    running Goggle apps, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the data <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has to</em></ins></span> be
-        <span class="removed"><del><strong>true, but it doesn't really matter. 
If it sells</strong></del></span> <span class="inserted"><ins><em>responsible 
for sending</em></ins></span>
-    the <span class="inserted"><ins><em>location</em></ins></span> data to 
<span class="inserted"><ins><em>Google.&lt;/p&gt;
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued</strong></del></span> <span class="inserted"><ins><em>be 
responsible</em></ins></span> for <span class="removed"><del><strong>collecting 
lots</strong></del></span> <span class="inserted"><ins><em>sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with</em></ins></span> a
-        <span class="removed"><del><strong>data broker, the data broker can 
figure out who the user is.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span> <span class="inserted"><ins><em>huge 
number of</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps that have access 
to</em></ins></span>
-    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to</em></ins></span> the 
<span class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
-    surveillance on which</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="removed"><del><strong>personal information about how
+    people use it&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+       &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes the</strong></del></span> <span 
class="inserted"><ins><em>have access to sensitive</em></ins></span> data <span 
class="inserted"><ins><em>without
+    users' knowledge&lt;/a&gt;. These hidden apps</em></ins></span> may <span 
class="removed"><del><strong>be
+        true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>either call home with
+    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>on to user-installed apps that have access 
to</em></ins></span>
+    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access</em></ins></span> to 
<span class="removed"><del><strong>a
+        data broker,</strong></del></span> the <span 
class="removed"><del><strong>data broker can figure out 
who</strong></del></span> <span class="inserted"><ins><em>data. This results in 
massive
+    surveillance on which</em></ins></span> the user <span 
class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>has absolutely no control.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
+        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;The app reports the temperature</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
+    send sensitive personal data to third parties&lt;/a&gt;, which can 
use</em></ins></span> it
+    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it is <span class="removed"><del><strong>surrounded by</strong></del></span> 
<span class="inserted"><ins><em>buried in
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>surrounded by</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried in
     lengthy terms of service that are difficult to understand. In any case,
     &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
@@ -1293,124 +1307,84 @@
       &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information</em></ins></span> on 
<span class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The AppCensus database gives information</em></ins></span> on 
<span class="removed"><del><strong>children and adults.&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are 
ineffective</em></ins></span> at <span class="removed"><del><strong>Low 
Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>preventing nonfree software developers 
from including malware</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note that</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>total) link this ID to hardware 
identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>in apparent 
violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
+    <span class="inserted"><ins><em>their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
+    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>Google 
Play had one or more malicious functionalities, such as</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span class="inserted"><ins><em>them 
was designed to make uninstallation
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>users, and 
redirecting
+    them to phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps 
if</em></ins></span> they <span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>haven't yet, but they should also stay 
away from nonfree apps</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
-    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
+    there</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span> 
really
+<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+  &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising&mdash;that could
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>their
+    source code&mdash;often used for invasive advertising&mdash;that could
     potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
@@ -1419,44 +1393,18 @@
     the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>will do
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
     &lt;p&gt;We think that lawsuit is about a side issue. What the company does
@@ -1465,204 +1413,110 @@
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="inserted"><ins><em>WeatherBug, are
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
   &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>many e-readers&mdash;not</strong></del></span> 
<span class="inserted"><ins><em>the app; others</em></ins></span> only <span 
class="inserted"><ins><em>say that</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>user is
+    the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
user <span class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones</em></ins></span> of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>system has 
no authentication</strong></del></span> <span class="inserted"><ins><em>user's 
location even</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>users disable &ldquo;location
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
-    tracking, but most users will</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>tricked by</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables the phone company to track</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;We expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>save
-    a recording. But we can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Proprietary software</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will 
benefit</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
     of the 5,855 Android apps studied by researchers were found to snoop
-    and collect</em></ins></span> information about <span 
class="removed"><del><strong>drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span> <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
-    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>this article,</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>not
-      really a matter of</strong></del></span> <span 
class="inserted"><ins><em>evidence that</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
-      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>apps generally work against
-    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
-    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done</strong></del></span> <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
-    Android</em></ins></span> by <span class="removed"><del><strong>malware. 
The other
-      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://replicant.us"&gt;switching</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,</em></ins></span>
-    and
-      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>proprietary apps by 
getting apps from the free software
-    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user</em></ins></span> if <span class="inserted"><ins><em>an app 
contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to <span 
class="removed"><del><strong>get the data
-      and hand it over, the state can store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>place new items on top 
under</strong></del></span> each <span class="removed"><del><strong>subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
-    <span class="inserted"><ins><em>other but not</em></ins></span> to <span 
class="inserted"><ins><em>the server's database.&lt;/p&gt;
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service</em></ins></span>
-    spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. It &lt;a
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
+  &lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software in popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a <span class="removed"><del><strong>joke: The 
other day</strong></del></span> <span class="inserted"><ins><em>user's 
movements around</em></ins></span> a <span class="removed"><del><strong>woman 
came up to me</strong></del></span> <span class="inserted"><ins><em>physical 
store by noticing WiFi
+    follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note</em></ins></span> that <span 
class="removed"><del><strong>was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't 
expect</strong></del></span> this <span class="removed"><del><strong>has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>article misuses the words
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to <span class="removed"><del><strong>get 
users' formal
-      consent before collecting personal data</strong></del></span> <span 
class="inserted"><ins><em>zero price.&lt;/p&gt;
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
@@ -1678,24 +1532,22 @@
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
-    &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</em></ins></span>
-    are <span class="removed"><del><strong>totally inadequate.
-      And</strong></del></span> <span 
class="inserted"><ins><em>malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see</em></ins></span> what <span 
class="removed"><del><strong>happens if</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
     the source code somehow to determine whether they mistreat users in
-    various ways. If it did</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>good job of 
this, it could more or less
-    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source 
code</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the
-    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
@@ -1712,11 +1564,8 @@
   &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by</em></ins></span> 
TV <span class="removed"><del><strong>will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws</strong></del></span>
-    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
@@ -1729,10 +1578,10 @@
     &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app</em></ins></span> would <span 
class="removed"><del><strong>say</strong></del></span> <span 
class="inserted"><ins><em>record the names of the audio files users listen to
+    the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span 
class="inserted"><ins><em>this was done without the users' consent.
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
@@ -2311,28 +2160,43 @@
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
     passes by, the user's front door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at the videos freely.  It appears Amazon has tried to prevent that
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look</em></ins></span>
+    at <span class="removed"><del><strong>Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>the videos 
freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give</em></ins></span> the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>everything</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span>
+    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
+    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
+    manufacturers promise not to look at what's</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>the videos. That's not
     security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2342,27 +2206,43 @@
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    to outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
+    into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
     recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2370,7 +2250,18 @@
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>its users 
through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
@@ -2379,33 +2270,78 @@
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
     products, rather than free software which users could have checked
-    and changed.&lt;/p&gt;
+    and changed.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The company that made the vibrator &lt;a
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>company that made</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but it doesn't really matter. If</em></ins></span> it <span 
class="inserted"><ins><em>had sold the data</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out 
who</em></ins></span> the
+    user <span class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span class="inserted"><ins><em>pay a total 
of C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
+    customers.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>nonfree software are</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  effectively
+  anyone</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to</em></ins></span> access <span 
class="removed"><del><strong>its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>do because</strong></del></span> <span 
class="inserted"><ins><em>these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2413,12 +2349,15 @@
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen</em></ins></span> in <span class="inserted"><ins><em>on 
a child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span>
+    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
@@ -2437,8 +2376,10 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    to snoop on other people, DJI</em></ins></span> is
+    <span class="removed"><del><strong>proprietary,</strong></del></span> 
<span class="inserted"><ins><em>in many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2452,121 +2393,182 @@
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    when</em></ins></span> it <span class="removed"><del><strong>demands blind 
faith</strong></del></span> <span class="inserted"><ins><em>is not supposed to 
listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
-    users were easily identified from these recordings.&lt;/p&gt;
+    users were easily identified</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what it records or sends.&lt;/p&gt;
+    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying to better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google service.&lt;/p&gt;
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is</em></ins></span> no <span class="removed"><del><strong>one 
connects</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> to <span 
class="inserted"><ins><em>see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
+    get commands that</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send to some Google 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more</em></ins></span> information 
<span class="removed"><del><strong>about drivers' movements&lt;/a&gt;,
+      which</strong></del></span> <span class="inserted"><ins><em>from users
+    than</em></ins></span> is <span class="inserted"><ins><em>necessary for 
correct functioning (time, location,
+    recordings</em></ins></span> made <span 
class="removed"><del><strong>available to car manufacturers, insurance 
companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span 
class="inserted"><ins><em>without</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
     even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
-    advertising companies and government agencies. In other words,
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>invasion isn't 
done</strong></del></span> <span class="inserted"><ins><em>data remain on other 
servers&lt;/a&gt;, where they can be accessed</em></ins></span> by <span 
class="removed"><del><strong>malware. The</strong></del></span>
+    <span class="inserted"><ins><em>advertising companies and government 
agencies. In</em></ins></span> other
+      <span class="removed"><del><strong>cases mentioned</strong></del></span> 
<span class="inserted"><ins><em>words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
+    the devices</em></ins></span> are <span class="removed"><del><strong>done 
by proprietary malware</strong></del></span> <span 
class="inserted"><ins><em>tethered to. Moreover, they are made available to
     Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
+    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
     in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;).</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;.</em></ins></span> 
The <span class="removed"><del><strong>company says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span> 
to <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="inserted"><ins><em>client program is nonfree, and</em></ins></span> data 
<span class="inserted"><ins><em>processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
+    tell you how</em></ins></span> and <span class="removed"><del><strong>hand 
it over,</strong></del></span> <span class="inserted"><ins><em>where it's 
done&rdquo;), users have no way
+    to know what happens to</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>recordings 
unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201902080"&gt;
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the user <span 
class="removed"><del><strong>watches &mdash; no exceptions!&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt; to</em></ins></span> make sure 
<span class="removed"><del><strong>to place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>the user is still
+    paying for the subscription, and hasn't printed more pages 
than</em></ins></span> were <span class="removed"><del><strong>programmed to 
spy</strong></del></span>
+    <span class="inserted"><ins><em>paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further</strong></del></span> <span 
class="inserted"><ins><em>is still
-    paying for the subscription, and hasn't printed more 
pages</em></ins></span> than <span class="removed"><del><strong>other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
-    paid for.&lt;/p&gt;
-
-    &lt;p&gt;Even though the ink subscription program may be 
cheaper</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>some
-    specific cases, it spies</em></ins></span> on 
-      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>users, and 
involves totally unacceptable
-    restrictions</em></ins></span> in <span 
class="removed"><del><strong>detail</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
+    restrictions</em></ins></span> in <span class="removed"><del><strong>TV 
Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon 
device,</em></ins></span>
-    and 
-      <span class="removed"><del><strong>link</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>security of 
an</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>device,
+    and</em></ins></span> &lt;a <span class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for</em></ins></span> them <span 
class="removed"><del><strong>your IP address&lt;/a&gt; so</strong></del></span> 
<span class="inserted"><ins><em>to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>advertisers can 
track</strong></del></span> <span class="inserted"><ins><em>country,
-    do</em></ins></span> you 
-      <span class="removed"><del><strong>across devices.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
+    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
  
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>think Amazon would have the moral 
fiber</em></ins></span> to <span class="removed"><del><strong>turn this 
off,</strong></del></span> <span class="inserted"><ins><em>say no?&lt;/p&gt;
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too,</em></ins></span> but 
<span class="removed"><del><strong>having it enabled</strong></del></span> 
<span class="inserted"><ins><em>please &lt;a
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  &lt;li id="M201804140"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    offers</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV manufacturers in spying</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that 
snoops</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>its user by
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+  &lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>products are 
designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="inserted"><ins><em>everyone 
in</em></ins></span> the <span class="removed"><del><strong>600 millions social 
media profiles</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone</em></ins></span> in <span 
class="removed"><del><strong>detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device that</em></ins></span> can <span 
class="removed"><del><strong>now</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;
+    a device</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> can <span 
class="removed"><del><strong>track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
+    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407170"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
     &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
       advertisement with online purchases&lt;/a&gt;, exposing all users to
       new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
@@ -3218,7 +3220,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/19 10:32:23 $
+$Date: 2019/10/31 12:01:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.309
retrieving revision 1.310
diff -u -b -r1.309 -r1.310
--- proprietary-surveillance.ja.po      19 Oct 2019 10:32:23 -0000      1.309
+++ proprietary-surveillance.ja.po      31 Oct 2019 12:01:58 -0000      1.310
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -908,6 +908,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.249
retrieving revision 1.250
diff -u -b -r1.249 -r1.250
--- proprietary-surveillance.pot        19 Oct 2019 10:32:23 -0000      1.249
+++ proprietary-surveillance.pot        31 Oct 2019 12:01:58 -0000      1.250
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -658,6 +658,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a "
+"href=\"https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\";>
 "
+"sends browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to "
+"&ldquo;fraudulent&rdquo; websites. Since Tencent collaborates with the "
+"Chinese government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a "
 
"href=\"https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\";>
 "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.576
retrieving revision 1.577
diff -u -b -r1.576 -r1.577
--- proprietary-surveillance.ru.po      19 Oct 2019 15:58:38 -0000      1.576
+++ proprietary-surveillance.ru.po      31 Oct 2019 12:01:58 -0000      1.577
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -891,6 +892,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
 "trackers that are busy at night <a href=\"https://www.oregonlive.com/";
 "opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary.de-diff.html    28 Oct 2019 07:01:14 -0000      1.137
+++ proprietary.de-diff.html    31 Oct 2019 12:01:58 -0000      1.138
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,17 +101,17 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -130,9 +130,9 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -163,10 +163,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -188,6 +188,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;p&gt;Apple plans to require that &lt;a
     
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
@@ -249,14 +261,6 @@
     &lt;p&gt;Obeying the &ldquo;local laws&rdquo; about what people can do with
     software is no excuse for censoring what software people can use.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910071"&gt;
-    &lt;p&gt;Adobe has &lt;a
-    
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order"&gt;
-    cancelled the software subscriptions of all users in
-    Venezuela&lt;/a&gt;. This demonstrates how a requirement for subscription 
can be
-    turned into a tool for sabotage.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -318,7 +322,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/28 07:01:14 $
+$Date: 2019/10/31 12:01:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary.de.po   28 Oct 2019 07:01:14 -0000      1.179
+++ proprietary.de.po   31 Oct 2019 12:01:58 -0000      1.180
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -455,6 +455,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."
@@ -531,14 +544,6 @@
 "is no excuse for censoring what software people can use."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary.es.po   29 Oct 2019 10:55:47 -0000      1.239
+++ proprietary.es.po   31 Oct 2019 12:01:58 -0000      1.240
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -312,6 +313,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."
@@ -434,19 +448,6 @@
 "La obediencia a «leyes locales» relativas a lo que la gente puede hacer con 
"
 "el software no es excusa para censurar qué software puede utilizar la gente."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-"Adobe ha <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\">cancelado las "
-"suscripciones de software de todos los usuarios de Venezuela</a>. Esto "
-"muestra la manera en que un requisito de suscripción pude convertirse en un "
-"instrumento de sabotaje."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -524,6 +525,18 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-";
+#~ "to-ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the "
+#~ "software subscriptions of all users in Venezuela</a>. This demonstrates "
+#~ "how a requirement for subscription can be turned into a tool for sabotage."
+#~ msgstr ""
+#~ "Adobe ha <a href=\"https://www.bleepingcomputer.com/news/software/adobe-";
+#~ "to-ban-users-from-venezuela-due-to-us-executive-order\">cancelado las "
+#~ "suscripciones de software de todos los usuarios de Venezuela</a>. Esto "
+#~ "muestra la manera en que un requisito de suscripción pude convertirse en "
+#~ "un instrumento de sabotaje."
+
+#~ msgid ""
 #~ "A very popular app found in the Google Play store contained a module that "
 #~ "was designed to <a href=\"https://arstechnica.com/information-";
 #~ "technology/2019/08/google-play-app-with-100-million-downloads-executed-"

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary.fr.po   28 Oct 2019 07:31:59 -0000      1.286
+++ proprietary.fr.po   31 Oct 2019 12:01:58 -0000      1.287
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2019-10-28 08:31+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -308,6 +309,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."
@@ -431,18 +445,6 @@
 "logiciel n'est pas une excuse pour censurer quels logiciels ils peuvent "
 "utiliser."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-"Adobe a <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\">résilié tous les "
-"abonnements à ses logiciels au Venezuela</a>. Cela montre comment un "
-"abonnement obligatoire peut être transformé en instrument de sabotage. "
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -515,3 +517,14 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-";
+#~ "to-ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the "
+#~ "software subscriptions of all users in Venezuela</a>. This demonstrates "
+#~ "how a requirement for subscription can be turned into a tool for sabotage."
+#~ msgstr ""
+#~ "Adobe a <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
+#~ "ban-users-from-venezuela-due-to-us-executive-order\">résilié tous les "
+#~ "abonnements à ses logiciels au Venezuela</a>. Cela montre comment un "
+#~ "abonnement obligatoire peut être transformé en instrument de sabotage. "

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary.it-diff.html    28 Oct 2019 07:01:17 -0000      1.149
+++ proprietary.it-diff.html    31 Oct 2019 12:01:58 -0000      1.150
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
@@ -162,10 +162,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -187,6 +187,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;p&gt;Apple plans to require that &lt;a
     
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
@@ -248,14 +260,6 @@
     &lt;p&gt;Obeying the &ldquo;local laws&rdquo; about what people can do with
     software is no excuse for censoring what software people can use.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910071"&gt;
-    &lt;p&gt;Adobe has &lt;a
-    
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order"&gt;
-    cancelled the software subscriptions of all users in
-    Venezuela&lt;/a&gt;. This demonstrates how a requirement for subscription 
can be
-    turned into a tool for sabotage.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -317,7 +321,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/28 07:01:17 $
+$Date: 2019/10/31 12:01:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary.it.po   28 Oct 2019 07:01:17 -0000      1.188
+++ proprietary.it.po   31 Oct 2019 12:01:58 -0000      1.189
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -459,6 +459,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."
@@ -535,14 +548,6 @@
 "is no excuse for censoring what software people can use."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.ja-diff.html    28 Oct 2019 07:01:17 -0000      1.152
+++ proprietary.ja-diff.html    31 Oct 2019 12:01:58 -0000      1.153
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -129,16 +129,16 @@
   &lt;/td&gt;
   &lt;td&gt;
    &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -161,10 +161,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -185,6 +185,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;p&gt;Apple plans to require that &lt;a
     
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
@@ -246,14 +258,6 @@
     &lt;p&gt;Obeying the &ldquo;local laws&rdquo; about what people can do with
     software is no excuse for censoring what software people can use.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910071"&gt;
-    &lt;p&gt;Adobe has &lt;a
-    
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order"&gt;
-    cancelled the software subscriptions of all users in
-    Venezuela&lt;/a&gt;. This demonstrates how a requirement for subscription 
can be
-    turned into a tool for sabotage.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -315,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/28 07:01:17 $
+$Date: 2019/10/31 12:01:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary.ja.po   28 Oct 2019 07:01:17 -0000      1.172
+++ proprietary.ja.po   31 Oct 2019 12:01:58 -0000      1.173
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -319,6 +319,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."
@@ -395,14 +408,6 @@
 "is no excuse for censoring what software people can use."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary.nl-diff.html    28 Oct 2019 07:01:17 -0000      1.150
+++ proprietary.nl-diff.html    31 Oct 2019 12:01:58 -0000      1.151
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
@@ -187,6 +187,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;p&gt;Apple plans to require that &lt;a
     
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
@@ -248,14 +260,6 @@
     &lt;p&gt;Obeying the &ldquo;local laws&rdquo; about what people can do with
     software is no excuse for censoring what software people can use.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910071"&gt;
-    &lt;p&gt;Adobe has &lt;a
-    
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order"&gt;
-    cancelled the software subscriptions of all users in
-    Venezuela&lt;/a&gt;. This demonstrates how a requirement for subscription 
can be
-    turned into a tool for sabotage.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -317,7 +321,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/28 07:01:17 $
+$Date: 2019/10/31 12:01:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.nl.po   28 Oct 2019 07:01:17 -0000      1.162
+++ proprietary.nl.po   31 Oct 2019 12:01:58 -0000      1.163
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -361,6 +361,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."
@@ -437,14 +450,6 @@
 "is no excuse for censoring what software people can use."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.pl-diff.html    28 Oct 2019 07:01:18 -0000      1.167
+++ proprietary.pl-diff.html    31 Oct 2019 12:01:58 -0000      1.168
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October, 2019, the pages in this directory 
list around 400
-instances of malicious functionalities (with more than 500 references to
+&lt;p&gt;As of October, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 500 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -131,12 +131,12 @@
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -185,6 +185,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;p&gt;Apple plans to require that &lt;a
     
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
@@ -246,14 +258,6 @@
     &lt;p&gt;Obeying the &ldquo;local laws&rdquo; about what people can do with
     software is no excuse for censoring what software people can use.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910071"&gt;
-    &lt;p&gt;Adobe has &lt;a
-    
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order"&gt;
-    cancelled the software subscriptions of all users in
-    Venezuela&lt;/a&gt;. This demonstrates how a requirement for subscription 
can be
-    turned into a tool for sabotage.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -315,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/28 07:01:18 $
+$Date: 2019/10/31 12:01:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary.pl.po   28 Oct 2019 07:01:18 -0000      1.155
+++ proprietary.pl.po   31 Oct 2019 12:01:58 -0000      1.156
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -540,6 +540,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."
@@ -616,14 +629,6 @@
 "is no excuse for censoring what software people can use."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.pot     28 Oct 2019 07:01:18 -0000      1.152
+++ proprietary.pot     31 Oct 2019 12:01:58 -0000      1.153
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -257,6 +257,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a "
+"href=\"https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\";>
 "
+"sends browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to "
+"&ldquo;fraudulent&rdquo; websites. Since Tencent collaborates with the "
+"Chinese government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a "
 
"href=\"https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/\";>
 "
 "all application software for MacOS be approved by Apple first</a>."
@@ -332,15 +345,6 @@
 "is no excuse for censoring what software people can use."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a "
-"href=\"https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order\";>
 "
-"cancelled the software subscriptions of all users in Venezuela</a>. This "
-"demonstrates how a requirement for subscription can be turned into a tool "
-"for sabotage."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.249
retrieving revision 1.250
diff -u -b -r1.249 -r1.250
--- proprietary.pt-br.po        28 Oct 2019 07:01:18 -0000      1.249
+++ proprietary.pt-br.po        31 Oct 2019 12:01:58 -0000      1.250
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2019-10-25 17:58-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -306,6 +306,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."
@@ -427,24 +440,6 @@
 "software não é uma desculpa para censurar qual software as pessoas podem "
 "usar."
 
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Adobe has <a href=\"https://helpx.adobe.com/x-productkb/policy-pricing/";
-#| "executive-order-venezuela.html\"> cancelled the software subscriptions of "
-#| "all users in Venezuela</a>. This demonstrates that a subscription "
-#| "requirement is a potential tool for sabotage."
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-"A Adobe <a href=\"https://helpx.adobe.com/x-productkb/policy-pricing/";
-"executive-order-venezuela.html\"> cancelou as assinaturas de software de "
-"todos os usuários na Venezuela</a>. Isso demonstra que um requisito da "
-"assinatura é uma ferramenta em potencial para sabotagem."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -519,6 +514,23 @@
 msgid "Updated:"
 msgstr "Última atualização:"
 
+#, fuzzy
+#~| msgid ""
+#~| "Adobe has <a href=\"https://helpx.adobe.com/x-productkb/policy-pricing/";
+#~| "executive-order-venezuela.html\"> cancelled the software subscriptions "
+#~| "of all users in Venezuela</a>. This demonstrates that a subscription "
+#~| "requirement is a potential tool for sabotage."
+#~ msgid ""
+#~ "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-";
+#~ "to-ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the "
+#~ "software subscriptions of all users in Venezuela</a>. This demonstrates "
+#~ "how a requirement for subscription can be turned into a tool for sabotage."
+#~ msgstr ""
+#~ "A Adobe <a href=\"https://helpx.adobe.com/x-productkb/policy-pricing/";
+#~ "executive-order-venezuela.html\"> cancelou as assinaturas de software de "
+#~ "todos os usuários na Venezuela</a>. Isso demonstra que um requisito da "
+#~ "assinatura é uma ferramenta em potencial para sabotagem."
+
 #~ msgid ""
 #~ "A very popular app found in the Google Play store contained a module that "
 #~ "was designed to <a href=\"https://arstechnica.com/information-";

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- proprietary.ru.po   29 Oct 2019 16:29:00 -0000      1.320
+++ proprietary.ru.po   31 Oct 2019 12:01:58 -0000      1.321
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -311,6 +312,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."
@@ -432,18 +446,6 @@
 "Подчинение &ldquo;местным законам&rdquo; о том, 
что люди могут делать с "
 "программами, не извиняет цензуру 
программ, которыми люди могут 
пользоваться."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-"Adobe <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-ban-";
-"users-from-venezuela-due-to-us-executive-order\"> отменила всю 
подписку "
-"пользователей из Венесуэлы</a>. Это 
показывает, как требование подписки "
-"может быть обращено в орудие саботажа."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -522,6 +524,17 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-";
+#~ "to-ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the "
+#~ "software subscriptions of all users in Venezuela</a>. This demonstrates "
+#~ "how a requirement for subscription can be turned into a tool for sabotage."
+#~ msgstr ""
+#~ "Adobe <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
+#~ "ban-users-from-venezuela-due-to-us-executive-order\"> отменила 
всю "
+#~ "подписку пользователей из Венесуэлы</a>. 
Это показывает, как требование "
+#~ "подписки может быть обращено в орудие 
саботажа."
+
+#~ msgid ""
 #~ "A very popular app found in the Google Play store contained a module that "
 #~ "was designed to <a href=\"https://arstechnica.com/information-";
 #~ "technology/2019/08/google-play-app-with-100-million-downloads-executed-"

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary.zh-tw-diff.html 28 Oct 2019 07:01:20 -0000      1.129
+++ proprietary.zh-tw-diff.html 31 Oct 2019 12:01:58 -0000      1.130
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,17 +101,17 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -130,9 +130,9 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -163,10 +163,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -188,6 +188,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;p&gt;Apple plans to require that &lt;a
     
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
@@ -249,14 +261,6 @@
     &lt;p&gt;Obeying the &ldquo;local laws&rdquo; about what people can do with
     software is no excuse for censoring what software people can use.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910071"&gt;
-    &lt;p&gt;Adobe has &lt;a
-    
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order"&gt;
-    cancelled the software subscriptions of all users in
-    Venezuela&lt;/a&gt;. This demonstrates how a requirement for subscription 
can be
-    turned into a tool for sabotage.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -318,7 +322,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/10/28 07:01:20 $
+$Date: 2019/10/31 12:01:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary.zh-tw.po        28 Oct 2019 07:01:20 -0000      1.140
+++ proprietary.zh-tw.po        31 Oct 2019 12:01:58 -0000      1.141
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -433,6 +433,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."
@@ -509,14 +522,6 @@
 "is no excuse for censoring what software people can use."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- pt-br.po    30 Oct 2019 17:00:15 -0000      1.200
+++ pt-br.po    31 Oct 2019 12:01:58 -0000      1.201
@@ -1371,6 +1371,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- ru.po       31 Oct 2019 03:59:28 -0000      1.335
+++ ru.po       31 Oct 2019 12:01:58 -0000      1.336
@@ -1657,6 +1657,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- zh-tw.po    30 Oct 2019 17:00:15 -0000      1.155
+++ zh-tw.po    31 Oct 2019 12:01:59 -0000      1.156
@@ -1276,6 +1276,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering.";
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to &ldquo;"
+"fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]