www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/po/free-software-even-more-impor...


From: GNUN
Subject: www philosophy/po/free-software-even-more-impor...
Date: Mon, 20 Jan 2020 14:04:03 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/01/20 14:04:02

Modified files:
        philosophy/po  : free-software-even-more-important.ar-diff.html 
                         free-software-even-more-important.ar.po 
                         free-software-even-more-important.de.po 
                         free-software-even-more-important.el-diff.html 
                         free-software-even-more-important.el.po 
                         free-software-even-more-important.es.po 
                         free-software-even-more-important.fr.po 
                         free-software-even-more-important.it-diff.html 
                         free-software-even-more-important.it.po 
                         free-software-even-more-important.ja.po 
                         free-software-even-more-important.lt-diff.html 
                         free-software-even-more-important.lt.po 
                         free-software-even-more-important.nl.po 
                         free-software-even-more-important.pt-br.po 
                         free-software-even-more-important.ru.po 
                         free-software-even-more-important.sq.po 
                         free-software-even-more-important.tr.po 
                         free-software-even-more-important.uk-diff.html 
                         free-software-even-more-important.uk.po 
                         free-software-even-more-important.zh-cn.po 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.es.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.ar-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.ar.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.de.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.el-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.el.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.es.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.fr.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.it-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.it.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.ja.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.lt-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.lt.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.nl.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.pt-br.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.ru.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.sq.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.tr.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.uk-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.uk.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.zh-cn.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.247&r2=1.248
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.362&r2=1.363
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.165&r2=1.166

Patches:
Index: philosophy/po/free-software-even-more-important.ar-diff.html
===================================================================
RCS file: 
/web/www/www/philosophy/po/free-software-even-more-important.ar-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- philosophy/po/free-software-even-more-important.ar-diff.html        30 Dec 
2019 12:08:32 -0000      1.16
+++ philosophy/po/free-software-even-more-important.ar-diff.html        20 Jan 
2020 19:03:59 -0000      1.17
@@ -57,8 +57,8 @@
 both &lt;em&gt;malware&lt;/em&gt;.  That is, both have functionalities 
designed to
 mistreat the user.  Proprietary software nowadays is often malware
 because &lt;a href="/proprietary/proprietary.html"&gt;the developers' power
-corrupts <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>them&lt;/a&gt;.  That directory lists around 
400 different
-malicious functionalities (as of April, 2019), but it is surely just the
+corrupts <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>them&lt;/a&gt;.  That directory lists around 
450 different
+malicious functionalities (as of January, 2020), but it is surely just the
 tip of the iceberg.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;With free software, the users control the program, both individually
@@ -375,7 +375,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2017, 2018, 2019</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2017, 2018, 2019, 2020</em></ins></span> 
Richard Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -385,7 +385,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/30 12:08:32 $
+$Date: 2020/01/20 19:03:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/free-software-even-more-important.ar.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.ar.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- philosophy/po/free-software-even-more-important.ar.po       30 Dec 2019 
12:08:32 -0000      1.18
+++ philosophy/po/free-software-even-more-important.ar.po       20 Jan 2020 
19:03:59 -0000      1.19
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2016-11-13 20:34+0100\n"
 "Last-Translator: Faycal Alami <address@hidden>\n"
 "Language-Team: Arabic <address@hidden>\n"
@@ -103,9 +103,9 @@
 # | <em>malware</em>.  That is, both have functionalities designed to mistreat
 # | the user.  Proprietary software nowadays is often malware because <a
 # | href=\"/proprietary/proprietary.html\">the developers' power corrupts
-# | them</a>.  {+That directory lists around 400 different malicious
-# | functionalities (as of April, 2019), but it is surely just the tip of the
-# | iceberg.+}
+# | them</a>.  {+That directory lists around 450 different malicious
+# | functionalities (as of January, 2020), but it is surely just the tip of
+# | the iceberg.+}
 #, fuzzy
 #| msgid ""
 #| "Those two nonfree programs have something else in common: they are both "
@@ -118,8 +118,8 @@
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "هناك قاسم مشترك بين هذين البرنامجين 
الاحتكاريين: فهما معاً <em>برنامجين "
 "خبيثين</em>. أي أن كليهما يتوفر على وظائف مصم
مة للإساءة للمستخدم. وفي الوقت "
@@ -813,10 +813,10 @@
 "href=\"/server/standards/README.translations.html\">دليل الترجم
Ø©</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015-] {+2015, 2017, 2018, 2019+} Richard Stallman
+# | Copyright &copy; [-2015-] {+2015, 2017, 2018, 2019, 2020+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2015 Richard Stallman"
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015 ريتشارد سالمن"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.de.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.de.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- philosophy/po/free-software-even-more-important.de.po       24 Jun 2019 
06:58:17 -0000      1.34
+++ philosophy/po/free-software-even-more-important.de.po       20 Jan 2020 
19:03:59 -0000      1.35
@@ -9,7 +9,7 @@
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2019-05-11 23:55+0200\n"
 "Last-Translator: Maximilian Bast <address@hidden>\n"
 "Language-Team: German <address@hidden>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -86,13 +87,29 @@
 "Macht, die niemand haben sollte."
 
 #. type: Content of: <p>
+# | Those two nonfree programs have something else in common: they are both
+# | <em>malware</em>.  That is, both have functionalities designed to mistreat
+# | the user.  Proprietary software nowadays is often malware because <a
+# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
+# | them</a>.  That directory lists around 4[-0-]{+5+}0 different malicious
+# | functionalities (as of [-April, 2019),-] {+January, 2020),+} but it is
+# | surely just the tip of the iceberg.
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>.  That is, both have functionalities designed to "
+#| "mistreat the user.  Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>.  That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
 msgid ""
 "Those two nonfree programs have something else in common: they are both "
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Diese beiden unfreien Programme haben noch etwas anderes gemein: beide sind "
 "<em>Schadsoftware</em>. Das heißt, beide verfügen über Funktionen, um den "
@@ -744,7 +761,10 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.el-diff.html
===================================================================
RCS file: 
/web/www/www/philosophy/po/free-software-even-more-important.el-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- philosophy/po/free-software-even-more-important.el-diff.html        30 Dec 
2019 12:08:32 -0000      1.16
+++ philosophy/po/free-software-even-more-important.el-diff.html        20 Jan 
2020 19:03:59 -0000      1.17
@@ -57,8 +57,8 @@
 both &lt;em&gt;malware&lt;/em&gt;.  That is, both have functionalities 
designed to
 mistreat the user.  Proprietary software nowadays is often malware
 because &lt;a href="/proprietary/proprietary.html"&gt;the developers' power
-corrupts <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>them&lt;/a&gt;.  That directory lists around 
400 different
-malicious functionalities (as of April, 2019), but it is surely just the
+corrupts <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>them&lt;/a&gt;.  That directory lists around 
450 different
+malicious functionalities (as of January, 2020), but it is surely just the
 tip of the iceberg.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;With free software, the users control the program, both individually
@@ -375,7 +375,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2017, 2018, 2019</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2017, 2018, 2019, 2020</em></ins></span> 
Richard Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -385,7 +385,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/30 12:08:32 $
+$Date: 2020/01/20 19:03:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/free-software-even-more-important.el.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.el.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- philosophy/po/free-software-even-more-important.el.po       16 Jul 2019 
16:30:03 -0000      1.17
+++ philosophy/po/free-software-even-more-important.el.po       20 Jan 2020 
19:03:59 -0000      1.18
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2016-05-08 22:12+0200\n"
 "Last-Translator: Georgios Zarkadas <address@hidden>\n"
 "Language-Team: Greek <address@hidden>\n"
@@ -102,9 +102,9 @@
 # | <em>malware</em>.  That is, both have functionalities designed to mistreat
 # | the user.  Proprietary software nowadays is often malware because <a
 # | href=\"/proprietary/proprietary.html\">the developers' power corrupts
-# | them</a>.  {+That directory lists around 400 different malicious
-# | functionalities (as of April, 2019), but it is surely just the tip of the
-# | iceberg.+}
+# | them</a>.  {+That directory lists around 450 different malicious
+# | functionalities (as of January, 2020), but it is surely just the tip of
+# | the iceberg.+}
 #, fuzzy
 #| msgid ""
 #| "Those two nonfree programs have something else in common: they are both "
@@ -117,8 +117,8 @@
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Αυτά τα δύο μη-ελεύθερα προγράμματα έχουν 
επίσης κάτι άλλο κοινό: είναι και "
 "τα δύο <em>κακόβουλο λογισμικό (malware)</em>.  
Δηλαδή, και τα δύο περιέχουν "
@@ -859,10 +859,10 @@
 "\"/server/standards/README.translations.html\">Μεταφράσεις 
ΔΙΑΒΑΣΕΜΕ</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015-] {+2015, 2017, 2018, 2019+} Richard Stallman
+# | Copyright &copy; [-2015-] {+2015, 2017, 2018, 2019, 2020+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2015 Richard Stallman"
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Πνευματικά δικαιώματα &copy; 2015 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.es.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- philosophy/po/free-software-even-more-important.es.po       15 Jan 2020 
11:58:20 -0000      1.56
+++ philosophy/po/free-software-even-more-important.es.po       20 Jan 2020 
19:03:59 -0000      1.57
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2019-05-25 11:20+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -83,13 +84,29 @@
 "del desarrollador del programa, poder que nadie debería tener."
 
 #. type: Content of: <p>
+# | Those two nonfree programs have something else in common: they are both
+# | <em>malware</em>.  That is, both have functionalities designed to mistreat
+# | the user.  Proprietary software nowadays is often malware because <a
+# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
+# | them</a>.  That directory lists around 4[-0-]{+5+}0 different malicious
+# | functionalities (as of [-April, 2019),-] {+January, 2020),+} but it is
+# | surely just the tip of the iceberg.
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>.  That is, both have functionalities designed to "
+#| "mistreat the user.  Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>.  That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
 msgid ""
 "Those two nonfree programs have something else in common: they are both "
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Esos dos programas, que no son libres, tienen algo más en común: ambos son "
 "<cite>malware</cite>. Es decir, ambos contienen funcionalidades que están "
@@ -735,7 +752,10 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.fr.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- philosophy/po/free-software-even-more-important.fr.po       24 May 2019 
11:42:35 -0000      1.53
+++ philosophy/po/free-software-even-more-important.fr.po       20 Jan 2020 
19:04:00 -0000      1.54
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2019-05-24 13:40+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -86,13 +87,29 @@
 "pouvoir que personne ne devrait posséder."
 
 #. type: Content of: <p>
+# | Those two nonfree programs have something else in common: they are both
+# | <em>malware</em>.  That is, both have functionalities designed to mistreat
+# | the user.  Proprietary software nowadays is often malware because <a
+# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
+# | them</a>.  That directory lists around 4[-0-]{+5+}0 different malicious
+# | functionalities (as of [-April, 2019),-] {+January, 2020),+} but it is
+# | surely just the tip of the iceberg.
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>.  That is, both have functionalities designed to "
+#| "mistreat the user.  Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>.  That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
 msgid ""
 "Those two nonfree programs have something else in common: they are both "
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Ces deux programmes non libres ont quelque chose d'autre en commun : ils "
 "sont tous deux « malveillants », c'est-à-dire qu'ils ont tous deux des "
@@ -754,7 +771,10 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.it-diff.html
===================================================================
RCS file: 
/web/www/www/philosophy/po/free-software-even-more-important.it-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- philosophy/po/free-software-even-more-important.it-diff.html        30 Dec 
2019 12:08:32 -0000      1.7
+++ philosophy/po/free-software-even-more-important.it-diff.html        20 Jan 
2020 19:04:00 -0000      1.8
@@ -57,8 +57,8 @@
 both &lt;em&gt;malware&lt;/em&gt;.  That is, both have functionalities 
designed to
 mistreat the user.  Proprietary software nowadays is often malware
 because &lt;a <span 
class="removed"><del><strong>href="/malware/"&gt;the</strong></del></span> 
<span 
class="inserted"><ins><em>href="/proprietary/proprietary.html"&gt;the</em></ins></span>
 developers' power
-corrupts them&lt;/a&gt;.  That directory lists around 400 different
-malicious functionalities (as of April, 2019), but it is surely just the
+corrupts them&lt;/a&gt;.  That directory lists around <span 
class="removed"><del><strong>400</strong></del></span> <span 
class="inserted"><ins><em>450</em></ins></span> different
+malicious functionalities (as of <span class="removed"><del><strong>April, 
2019),</strong></del></span> <span class="inserted"><ins><em>January, 
2020),</em></ins></span> but it is surely just the
 tip of the iceberg.&lt;/p&gt;
 
 &lt;p&gt;With free software, the users control the program, both individually
@@ -374,7 +374,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2017, 2018, <span 
class="removed"><del><strong>2019</strong></del></span> <span 
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -384,7 +384,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/30 12:08:32 $
+$Date: 2020/01/20 19:04:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/free-software-even-more-important.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.it.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- philosophy/po/free-software-even-more-important.it.po       24 May 2019 
11:02:49 -0000      1.53
+++ philosophy/po/free-software-even-more-important.it.po       20 Jan 2020 
19:04:00 -0000      1.54
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2019-04-18 22:23+0200\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian\n"
@@ -105,9 +105,9 @@
 # | <em>malware</em>.  That is, both have functionalities designed to mistreat
 # | the user.  Proprietary software nowadays is often malware because <a
 # | [-href=\"/malware/\">the-] {+href=\"/proprietary/proprietary.html\">the+}
-# | developers' power corrupts them</a>.  That directory lists around 400
-# | different malicious functionalities (as of April, 2019), but it is surely
-# | just the tip of the iceberg.
+# | developers' power corrupts them</a>.  That directory lists around
+# | 4[-0-]{+5+}0 different malicious functionalities (as of [-April, 2019),-]
+# | {+January, 2020),+} but it is surely just the tip of the iceberg.
 #, fuzzy
 #| msgid ""
 #| "Those two nonfree programs have something else in common: they are both "
@@ -121,8 +121,8 @@
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Questi due programmi non liberi hanno qualcos'altro in comune: sono entrambi "
 "<em>malware</em>, nel senso che contengono funzionalità irrispettose "
@@ -818,7 +818,10 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.ja.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- philosophy/po/free-software-even-more-important.ja.po       4 Jul 2019 
04:28:11 -0000       1.43
+++ philosophy/po/free-software-even-more-important.ja.po       20 Jan 2020 
19:04:00 -0000      1.44
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2019-07-01 14:49+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -78,13 +79,22 @@
 "ういった力は誰も有してはいけないのです。"
 
 #. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>.  That is, both have functionalities designed to "
+#| "mistreat the user.  Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>.  That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
 msgid ""
 "Those two nonfree programs have something else in common: they are both "
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "差異とは別に、この二つの不自由なプログラムはå…
±é€šã®ç‚¹ãŒã‚ります。両方とも<em>"
 "マルウェア</em>なのです。すなわち、そのユーザを虐待
するように設計された機能を"
@@ -697,7 +707,9 @@
 "README.translations.html\">翻訳 README</a>をご覧ください。"
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.lt-diff.html
===================================================================
RCS file: 
/web/www/www/philosophy/po/free-software-even-more-important.lt-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- philosophy/po/free-software-even-more-important.lt-diff.html        30 Dec 
2019 12:08:32 -0000      1.15
+++ philosophy/po/free-software-even-more-important.lt-diff.html        20 Jan 
2020 19:04:00 -0000      1.16
@@ -57,8 +57,8 @@
 both &lt;em&gt;malware&lt;/em&gt;.  That is, both have functionalities 
designed to
 mistreat the user.  Proprietary software nowadays is often malware
 because &lt;a href="/proprietary/proprietary.html"&gt;the developers' power
-corrupts <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>them&lt;/a&gt;.  That directory lists around 
400 different
-malicious functionalities (as of April, 2019), but it is surely just the
+corrupts <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>them&lt;/a&gt;.  That directory lists around 
450 different
+malicious functionalities (as of January, 2020), but it is surely just the
 tip of the iceberg.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;With free software, the users control the program, both individually
@@ -375,7 +375,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2017, 2018, 2019</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2017, 2018, 2019, 2020</em></ins></span> 
Richard Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -385,7 +385,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/30 12:08:32 $
+$Date: 2020/01/20 19:04:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/free-software-even-more-important.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.lt.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- philosophy/po/free-software-even-more-important.lt.po       30 Dec 2019 
12:08:32 -0000      1.19
+++ philosophy/po/free-software-even-more-important.lt.po       20 Jan 2020 
19:04:00 -0000      1.20
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2015-09-12 21:32+0300\n"
 "Last-Translator: Donatas Klimašauskas <address@hidden>\n"
 "Language-Team: Lithuanian <address@hidden>\n"
@@ -107,9 +107,9 @@
 # | <em>malware</em>.  That is, both have functionalities designed to mistreat
 # | the user.  Proprietary software nowadays is often malware because <a
 # | href=\"/proprietary/proprietary.html\">the developers' power corrupts
-# | them</a>.  {+That directory lists around 400 different malicious
-# | functionalities (as of April, 2019), but it is surely just the tip of the
-# | iceberg.+}
+# | them</a>.  {+That directory lists around 450 different malicious
+# | functionalities (as of January, 2020), but it is surely just the tip of
+# | the iceberg.+}
 #, fuzzy
 #| msgid ""
 #| "Those two nonfree programs have something else in common: they are both "
@@ -122,8 +122,8 @@
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Tos dvi programos turi kai ką daugiau bendro: jos abi yra <em>kenkėjiškos "
 "programos</em>.  Tai yra, abi turi funkcionalumus, suprojektuotus "
@@ -854,10 +854,10 @@
 "PERSKAITYKITEMANE</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015-] {+2015, 2017, 2018, 2019+} Richard Stallman
+# | Copyright &copy; [-2015-] {+2015, 2017, 2018, 2019, 2020+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2015 Richard Stallman"
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.nl.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- philosophy/po/free-software-even-more-important.nl.po       2 Aug 2019 
10:05:31 -0000       1.27
+++ philosophy/po/free-software-even-more-important.nl.po       20 Jan 2020 
19:04:00 -0000      1.28
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:08+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 
 #. type: Content of: <title>
@@ -81,13 +82,29 @@
 "gebruikers, macht die niemand zou moeten hebben."
 
 #. type: Content of: <p>
+# | Those two nonfree programs have something else in common: they are both
+# | <em>malware</em>.  That is, both have functionalities designed to mistreat
+# | the user.  Proprietary software nowadays is often malware because <a
+# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
+# | them</a>.  That directory lists around 4[-0-]{+5+}0 different malicious
+# | functionalities (as of [-April, 2019),-] {+January, 2020),+} but it is
+# | surely just the tip of the iceberg.
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>.  That is, both have functionalities designed to "
+#| "mistreat the user.  Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>.  That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
 msgid ""
 "Those two nonfree programs have something else in common: they are both "
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Deze twee private programma's hebben iets gemeen: ze zijn beide <em>malware</"
 "em>. Dat betekent dat ze functies hebben die zijn ontworpen om de gebruiker "
@@ -729,7 +746,10 @@
 "voor informatie over het onderhoud van vertalingen op deze website."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
 
 # bijgewerkt

Index: philosophy/po/free-software-even-more-important.pt-br.po
===================================================================
RCS file: 
/web/www/www/philosophy/po/free-software-even-more-important.pt-br.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- philosophy/po/free-software-even-more-important.pt-br.po    25 May 2019 
08:29:21 -0000      1.38
+++ philosophy/po/free-software-even-more-important.pt-br.po    20 Jan 2020 
19:04:00 -0000      1.39
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2019-05-25 04:50-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -82,13 +83,22 @@
 "sobre os usuários, poder que ninguém deveria ter."
 
 #. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>.  That is, both have functionalities designed to "
+#| "mistreat the user.  Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>.  That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
 msgid ""
 "Those two nonfree programs have something else in common: they are both "
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Esses dois programas não livres têm algo mais em comum: ambos são "
 "<em>malwares</em>. Ou seja, ambos têm funcionalidades concebidas para "
@@ -724,7 +734,9 @@
 "envio de traduções das páginas desse site."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.ru.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- philosophy/po/free-software-even-more-important.ru.po       24 May 2019 
13:57:37 -0000      1.51
+++ philosophy/po/free-software-even-more-important.ru.po       20 Jan 2020 
19:04:00 -0000      1.52
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2019-05-24 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -81,13 +82,29 @@
 "пользователями&nbsp;&mdash; власть, которой не 
должно быть ни у кого."
 
 #. type: Content of: <p>
+# | Those two nonfree programs have something else in common: they are both
+# | <em>malware</em>.  That is, both have functionalities designed to mistreat
+# | the user.  Proprietary software nowadays is often malware because <a
+# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
+# | them</a>.  That directory lists around 4[-0-]{+5+}0 different malicious
+# | functionalities (as of [-April, 2019),-] {+January, 2020),+} but it is
+# | surely just the tip of the iceberg.
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>.  That is, both have functionalities designed to "
+#| "mistreat the user.  Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>.  That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
 msgid ""
 "Those two nonfree programs have something else in common: they are both "
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Эти две программы объединяет другое: и та, 
и другая <em>вредоносна</em>. "
 "Другими словами, в обеих есть функции для 
ущемления пользователя. В наши дни "
@@ -727,7 +744,10 @@
 
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr ""
 "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman<br />Copyright "
 "&copy; 2015, 2017, 2018, 2019 Free Software Foundation, Inc. (translation)"

Index: philosophy/po/free-software-even-more-important.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.sq.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- philosophy/po/free-software-even-more-important.sq.po       3 Jun 2019 
11:32:03 -0000       1.45
+++ philosophy/po/free-software-even-more-important.sq.po       20 Jan 2020 
19:04:00 -0000      1.46
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2019-06-03 12:49+0300\n"
 "Last-Translator: Besnik Bleta <address@hidden>\n"
 "Language-Team: \n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
 "X-Generator: Poedit 2.2\n"
 
 #. type: Content of: <title>
@@ -79,13 +80,22 @@
 "përdoruesit, pushtet që nuk duhet ta ketë kush."
 
 #. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>.  That is, both have functionalities designed to "
+#| "mistreat the user.  Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>.  That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
 msgid ""
 "Those two nonfree programs have something else in common: they are both "
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Këto dy programe jo të lira kanë diçka të përbashkët: janë që të dy 
"
 "<em>malware</em>.  Domethënë, që të dy kanë funksione të konceptuar 
për "
@@ -719,7 +729,9 @@
 "standards/README.translations.html\">README për përkthimet</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Të drejta kopjimi &copy; 2015, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.tr.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/free-software-even-more-important.tr.po       14 Dec 2019 
09:59:54 -0000      1.2
+++ philosophy/po/free-software-even-more-important.tr.po       20 Jan 2020 
19:04:00 -0000      1.3
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2019-12-14 08:19+0100\n"
 "Last-Translator: T. E. Kalayci <address@hidden>\n"
 "Language-Team: Turkish <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
 "X-Generator: Poedit 2.2.4\n"
 
 #. type: Content of: <title>
@@ -79,13 +80,22 @@
 "iktidar sağlar, kimsenin sahip olmaması gereken bir güç."
 
 #. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>.  That is, both have functionalities designed to "
+#| "mistreat the user.  Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>.  That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
 msgid ""
 "Those two nonfree programs have something else in common: they are both "
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Bu iki özgür olmayan programın ortak bir yanı var: İkisi de <em>kötü 
amaçlı "
 "yazılım</em>. Yani her ikisi de kullanıcıya kötü davranmak üzere 
tasarlanmış "
@@ -715,7 +725,9 @@
 "\">çalışma&nbsp;sayfamızı</a> ziyaret edebilirsiniz."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.uk-diff.html
===================================================================
RCS file: 
/web/www/www/philosophy/po/free-software-even-more-important.uk-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- philosophy/po/free-software-even-more-important.uk-diff.html        30 Dec 
2019 12:08:32 -0000      1.13
+++ philosophy/po/free-software-even-more-important.uk-diff.html        20 Jan 
2020 19:04:00 -0000      1.14
@@ -57,8 +57,8 @@
 both &lt;em&gt;malware&lt;/em&gt;.  That is, both have functionalities 
designed to
 mistreat the user.  Proprietary software nowadays is often malware
 because &lt;a <span 
class="removed"><del><strong>href="/malware/"&gt;the</strong></del></span> 
<span 
class="inserted"><ins><em>href="/proprietary/proprietary.html"&gt;the</em></ins></span>
 developers' power
-corrupts them&lt;/a&gt;.  That directory lists around <span 
class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span> different
-malicious functionalities (as of <span class="removed"><del><strong>Apr 
2017),</strong></del></span> <span class="inserted"><ins><em>April, 
2019),</em></ins></span> but it is surely just the
+corrupts them&lt;/a&gt;.  That directory lists around <span 
class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>450</em></ins></span> different
+malicious functionalities (as of <span class="removed"><del><strong>Apr 
2017),</strong></del></span> <span class="inserted"><ins><em>January, 
2020),</em></ins></span> but it is surely just the
 tip of the iceberg.&lt;/p&gt;
 
 &lt;p&gt;With free software, the users control the program, both individually
@@ -374,7 +374,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -384,7 +384,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/30 12:08:32 $
+$Date: 2020/01/20 19:04:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/free-software-even-more-important.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.uk.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- philosophy/po/free-software-even-more-important.uk.po       24 May 2019 
11:02:50 -0000      1.35
+++ philosophy/po/free-software-even-more-important.uk.po       20 Jan 2020 
19:04:00 -0000      1.36
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2017-12-10 07:52+0200\n"
 "Last-Translator: Andriy Bandura <address@hidden>\n"
 "Language-Team: Ukrainian <>\n"
@@ -107,8 +107,8 @@
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "Ці дві невільні програми мають дещо 
спільне: вони обидві є <em>шкідливими "
 "програмами</em>.  Тобто обидві мають 
можливості, розроблені для  зневаги "
@@ -781,7 +781,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2015, 2017 Richard Stallman"
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2017 Річард Столмен"
 
 #. type: Content of: <div><p>

Index: philosophy/po/free-software-even-more-important.zh-cn.po
===================================================================
RCS file: 
/web/www/www/philosophy/po/free-software-even-more-important.zh-cn.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- philosophy/po/free-software-even-more-important.zh-cn.po    25 May 2019 
13:00:59 -0000      1.21
+++ philosophy/po/free-software-even-more-important.zh-cn.po    20 Jan 2020 
19:04:00 -0000      1.22
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
 "PO-Revision-Date: 2019-05-25 20:40+0800\n"
 "Last-Translator: Wensheng Xie <address@hidden>\n"
 "Language-Team: Chinese <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -73,13 +74,22 @@
 "力,而任何人都不应该拥有这样的权力。"
 
 #. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>.  That is, both have functionalities designed to "
+#| "mistreat the user.  Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>.  That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
 msgid ""
 "Those two nonfree programs have something else in common: they are both "
 "<em>malware</em>.  That is, both have functionalities designed to mistreat "
 "the user.  Proprietary software nowadays is often malware because <a href=\"/"
 "proprietary/proprietary.html\">the developers' power corrupts them</a>.  "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
 msgstr ""
 "这两种非自由软件还有一些å…
±åŒç‚¹ï¼šå®ƒä»¬éƒ½æ˜¯<em>恶意软件</em>。就是说,它们都带有"
 "损害用户的功能。当今的专有软件通常都是恶意软件,因
为<a href=\"/proprietary/"
@@ -614,7 +624,9 @@
 "翻译须知</a>获取有关协调和提交翻译的相关事项。"
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/po/de.po        27 Dec 2019 10:34:03 -0000      1.165
+++ proprietary/po/de.po        20 Jan 2020 19:04:00 -0000      1.166
@@ -7764,6 +7764,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -9517,6 +9541,18 @@
 "androidsecuritytest.com 2011.\">verstecktes allgemeines Überwachungspaket "
 "wie <b>Carrier IQ</b></a> hinzu."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Malware in Webpages - GNU Project - Free Software Foundation"
 msgstr ""
@@ -10496,10 +10532,10 @@
 "zusammengestellt."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2014-201[-8-]{+9+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2014-2018-] {+2014-2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 201<ins>3</ins>-2018 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -11657,8 +11693,8 @@
 "übers Ohr gehauen zu werden&#160;…"
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
 # | [-functionalities,-] {+functionalities (with more than 500 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
@@ -11667,7 +11703,7 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -12013,15 +12049,15 @@
 msgstr "Letzte Ergänzungen"
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr "Copyright &copy; 2013-2018 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -13759,6 +13795,35 @@
 "<a href=\"/proprietary/malware-microsoft\">Schadsoftware von Microsoft</a>"
 
 #, fuzzy
+#~| msgid "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
+#~ msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 201<ins>3</ins>-2018 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten 
"
+#~ "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt "
+#~ "sind (Stand 2017-04)."
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013-2018 Free Software Foundation, Inc."
+
+#, fuzzy
 #~| msgid ""
 #~| "This page describes how various proprietary programs mess up the user's "
 #~| "system. They are like sabotage, but they are not grave enough to qualify "

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- proprietary/po/es.po        27 Dec 2019 10:34:03 -0000      1.235
+++ proprietary/po/es.po        20 Jan 2020 19:04:00 -0000      1.236
@@ -7367,6 +7367,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -9120,6 +9144,20 @@
 "features/logs-and-services/loggers/carrieriq/\">paquete de vigilancia "
 "general oculto como Carrier IQ</a>."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 # | Malware in [-Mobile Devices-] {+Webpages+} - GNU Project - Free Software
 # | Foundation
@@ -10228,12 +10266,11 @@
 "traseras</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015-] {+2014-2019+} Free Software Foundation,
-# | Inc.
+# | Copyright &copy; [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
 #, fuzzy
-#| msgid "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
+#| msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Proprietary Censorship - GNU Project - Free Software Foundation"
@@ -11425,22 +11462,22 @@
 "de ser engañado."
 
 #. type: Content of: <div><p>
-# | As of [-April,-] {+October,+} 2019, the pages in this directory list
-# | around 400 instances of malicious functionalities (with more than [-450-]
-# | {+500+} references to back them up), but there are surely thousands more
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
 # | we don't know about.
 #, fuzzy
 #| msgid ""
-#| "As of April, 2019, the pages in this directory list around 400 instances "
-#| "of malicious functionalities (with more than 450 references to back them "
-#| "up), but there are surely thousands more we don't know about."
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
-"Hasta abril de 2019, las páginas de este directorio ofrecían una lista de "
-"alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 450 "
+"Hasta octubre de 2019, las páginas de este directorio ofrecían una lista de 
"
+"alrededor de 500 ejemplos de funcionalidades maliciosas (con más de 450 "
 "referencias de apoyo), pero seguramente hay miles más que desconocemos."
 
 #. type: Content of: <div><table><tr><th>
@@ -11671,17 +11708,17 @@
 msgstr "Añadidos recientes"
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 "Foundation, Inc."
 
 #. type: Content of: <title>
@@ -13403,6 +13440,36 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft</a>"
 
 #, fuzzy
+#~| msgid "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
+#~ msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the pages in this directory list around 400 instances "
+#~| "of malicious functionalities (with more than 450 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Hasta abril de 2019, las páginas de este directorio ofrecían una lista 
de "
+#~ "alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 450 "
+#~ "referencias de apoyo), pero seguramente hay miles más que desconocemos."
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
 #~| msgid ""
 #~| "This page describes how various proprietary programs harass or annoy the "
 #~| "user, or cause trouble for the user.  These actions are like sabotage "

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary/po/fr.po        27 Dec 2019 16:03:54 -0000      1.287
+++ proprietary/po/fr.po        20 Jan 2020 19:04:00 -0000      1.288
@@ -6469,6 +6469,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -8090,6 +8114,18 @@
 "features/logs-and-services/loggers/carrieriq/\">un logiciel de surveillance "
 "cachée tous azimuts comme Carrier IQ</a>."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Malware in Webpages - GNU Project - Free Software Foundation"
 msgstr "Malveillance des pages web - Projet GNU - Free Software Foundation"
@@ -9038,7 +9074,10 @@
 "dérobées</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+# | Copyright &copy; [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -9990,8 +10029,17 @@
 "typiquement un moyen de mal se conduire."
 
 #. type: Content of: <div><p>
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -10211,9 +10259,15 @@
 msgstr "Ajouts récents"
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr "Copyright &copy; 2013-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -11601,3 +11655,20 @@
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
 msgstr ""
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
+
+#~ msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "En octobre 2019, les pages de ce répertoire dénombraient à peu près 
400 "
+#~ "cas de fonctionnalités malveillante (appuyés par plus de 500 
références), "
+#~ "mais il y en a sûrement des milliers d'autres dont nous ne savons rien."
+
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013-2019 Free Software Foundation, Inc."

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/po/it.po        27 Dec 2019 10:34:04 -0000      1.165
+++ proprietary/po/it.po        20 Jan 2020 19:04:00 -0000      1.166
@@ -7351,6 +7351,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -8959,6 +8983,17 @@
 "features/logs-and-services/loggers/carrieriq/\">pacchetto di sorveglianza "
 "generale nascosto come Carrier IQ</a>."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Malware in [-Mobile Devices-] {+Webpages+} - GNU Project - Free Software
 # | Foundation
@@ -9879,10 +9914,10 @@
 "deeplinks/2015/02/who-really-owns-your-drones\">uso di backdoor</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2014-201[-7-]{+9+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2014-2017-] {+2014-2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -10948,8 +10983,8 @@
 "norma. Il software proprietario moderno è tipicamente una fregatura."
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
 # | [-functionalities,-] {+functionalities (with more than 500 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
@@ -10958,7 +10993,7 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -11312,15 +11347,15 @@
 msgstr "Ultime aggiunte"
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."
@@ -13034,6 +13069,36 @@
 msgstr ""
 "<a href=\"/proprietary/malware-microsoft.html\">Malware di Microsoft</a>"
 
+#, fuzzy
+#~| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+#~ msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità "
+#~ "malevole, ma sicuramente ce ne sono altre migliaia che ancora non "
+#~ "conosciamo."
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
 #~ msgid ""
 #~ "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
 #~ "malware</a>"

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- proprietary/po/ja.po        31 Dec 2019 01:04:17 -0000      1.173
+++ proprietary/po/ja.po        20 Jan 2020 19:04:00 -0000      1.174
@@ -5628,6 +5628,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -6846,6 +6870,15 @@
 "services/loggers/carrieriq/\">Carrier IQのような隠
された一般監視パッケージ</"
 "a>を加えました。"
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Malware in Webpages - GNU Project - Free Software Foundation"
 msgstr ""
@@ -7594,7 +7627,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -8500,7 +8533,7 @@
 #| "instances of malicious functionalities, but there are surely thousands "
 #| "more we don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -8732,8 +8765,8 @@
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 
@@ -10151,6 +10184,35 @@
 msgstr "<a 
href=\"/proprietary/malware-microsoft.html\">マイクロソフト</a>"
 
 #, fuzzy
+#~| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+#~ msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
+#~| "As of January, 2017, the files in this directory list around 260 "
+#~| "instances of malicious functionalities, but there are surely thousands "
+#~| "more we don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ 
"2017年1月時点で、ここには、約260の異なる悪意のある機能の実例が掲載されてい"
+#~ 
"ますが、確実にわたしたちが知らない何千もの例があるでしょう。"
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~ "Inc."
+
+#, fuzzy
 #~| msgid ""
 #~| "This page describes how various proprietary programs mess up the user's "
 #~| "system. They are like sabotage, but they are not grave enough to qualify "

Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/po/malware-mobiles.de-diff.html 19 Nov 2019 09:01:34 -0000      
1.71
+++ proprietary/po/malware-mobiles.de-diff.html 20 Jan 2020 19:04:00 -0000      
1.72
@@ -190,118 +190,197 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-  Samsung Galaxy devices running proprietary Android versions come 
with</strong></del></span>
+  Samsung Galaxy devices running proprietary Android 
versions</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201908270"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M202001090"&gt;
+    &lt;p&gt;Android phones subsidized by the US government</em></ins></span> 
come with <span class="inserted"><ins><em>&lt;a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt; that provides remote access to the 
data stored on the
+  device.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+  Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+  &lt;p&gt;In Android,
+  &lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+  Google has</strong></del></span> <span class="inserted"><ins><em>door for 
forcing installation of
+    apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is in</em></ins></span> a <span 
class="inserted"><ins><em>modified version of an
+    essential system configuration app. The</em></ins></span> back door <span 
class="inserted"><ins><em>is a
+    surreptitious addition</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps.&lt;/a&gt;  (It was 
in</strong></del></span> a program <span class="removed"><del><strong>called 
GTalkService, which seems since then to have been
+  merged into Google Play.)
+  &lt;/p&gt;
+
+  &lt;p&gt;
+  Google can also
+  &lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+  forcibly and remotely install apps&lt;/a&gt; through Google Play.
+  This</strong></del></span> <span class="inserted"><ins><em>whose stated 
purpose</em></ins></span> is <span class="removed"><del><strong>not 
equivalent</strong></del></span> to <span 
class="inserted"><ins><em>be</em></ins></span> a <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;</em></ins></span>
+    universal back <span class="removed"><del><strong>door, but permits various
+  dirty tricks.
+  &lt;/p&gt;
+
+  &lt;p&gt;
+  Although Google's &lt;em&gt;exercise&lt;/em&gt; of this 
power</strong></del></span> <span class="inserted"><ins><em>door for 
firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is 
malicious</em></ins></span> has <span class="removed"><del><strong>not 
been</strong></del></span>
+    <span class="inserted"><ins><em>a secret secondary</em></ins></span> 
malicious <span class="removed"><del><strong>so far, the 
point</strong></del></span> <span class="inserted"><ins><em>purpose. All 
this</em></ins></span> is <span class="removed"><del><strong>that nobody should 
have such power,
+  which could also be used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>in 
addition</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>the
+    malware of Android itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908270"&gt;
     &lt;p&gt;A very popular app found in the
     Google Play store contained</em></ins></span> a
-  <span class="removed"><del><strong>back door&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>module</em></ins></span> that <span 
class="removed"><del><strong>provides remote access</strong></del></span> <span 
class="inserted"><ins><em>was designed</em></ins></span> to <span 
class="removed"><del><strong>the data stored</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  <span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs</strong></del></span> <span 
class="inserted"><ins><em>module</em></ins></span> that <span 
class="removed"><del><strong>it
+  considers malicious.  But there is no excuse for allowing 
it</strong></del></span> <span class="inserted"><ins><em>was 
designed</em></ins></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt; the programs, and you 
should have</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
-    install malware</em></ins></span> on the
-  <span class="removed"><del><strong>device.&lt;/p&gt;
+    install malware on</em></ins></span> the <span 
class="removed"><del><strong>right to
+  decide who (if anyone)</strong></del></span> <span 
class="inserted"><ins><em>user's computer&lt;/a&gt;. The app developers
+    regularly used it</em></ins></span> to <span 
class="removed"><del><strong>trust in this way.
+  &lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-  Samsung's back door&lt;/a&gt; provides access</strong></del></span> <span 
class="inserted"><ins><em>user's computer&lt;/a&gt;. The app developers
-    regularly used it</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer download and execute any code
-    they wanted.&lt;/p&gt;
+&lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
 
-    &lt;p&gt;This is a concrete example of what users are exposed to when they
-    run nonfree apps. They can never be completely sure that a nonfree
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest 
of</strong></del></span> <span class="inserted"><ins><em>make</em></ins></span> 
the <span class="removed"><del><strong>file</strong></del></span> <span 
class="inserted"><ins><em>computer download and execute any 
code</em></ins></span>
+    they <span class="removed"><del><strong>do not count as malware. We 
mention them</strong></del></span> <span 
class="inserted"><ins><em>wanted.&lt;/p&gt;
+
+    &lt;p&gt;This is a concrete example of what users are 
exposed</em></ins></span> to <span class="removed"><del><strong>refute the
+  supposition that prestigious proprietary software doesn't have grave
+  bugs.&lt;/p&gt;
+
+&lt;ul&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Siri, Alexa, and all the other voice-control 
systems</strong></del></span> <span class="inserted"><ins><em>when they
+    run nonfree apps. They</em></ins></span> can <span 
class="inserted"><ins><em>never</em></ins></span> be
+  <span class="removed"><del><strong>&lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands in ultrasound</strong></del></span> <span 
class="inserted"><ins><em>completely sure</em></ins></span> that <span 
class="removed"><del><strong>humans can't hear&lt;/a&gt;.
+  &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; because 
of</strong></del></span> a <span class="removed"><del><strong>bug in
+       Broadcom's non-free firmware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree
     app is safe.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;In Android,</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Samsung</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201609130"&gt;
-    &lt;p&gt;Xiaomi phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google has</strong></del></span>
+    &lt;p&gt;Xiaomi</em></ins></span> phones <span 
class="inserted"><ins><em>come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;</em></ins></span>
-    a <span class="inserted"><ins><em>universal</em></ins></span> back door 
<span class="removed"><del><strong>to remotely delete apps.&lt;/a&gt;  (It 
was</strong></del></span> in <span class="removed"><del><strong>a
-  program called GTalkService, which seems since then to have been
-  merged into Google Play.)
-  &lt;/p&gt;
+    a <span class="removed"><del><strong>security hole that allows an SMS 
message to install
+ransomware&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-  &lt;p&gt;
-  Google</strong></del></span> <span class="inserted"><ins><em>the application 
processor, for Xiaomi's
+&lt;li&gt;
+&lt;p&gt;Many proprietary payment apps &lt;a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> in <span 
class="removed"><del><strong>an insecure way&lt;/a&gt;.
+However,</strong></del></span> the <span class="removed"><del><strong>worse 
aspect of these apps</strong></del></span> <span 
class="inserted"><ins><em>application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor that the local phone
-    company</em></ins></span> can <span 
class="removed"><del><strong>also</strong></del></span> <span 
class="inserted"><ins><em>use&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>separate from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+  The NSA can tap data</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;the
+    universal back door</em></ins></span> in <span 
class="removed"><del><strong>smart phones, including iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there is not much detail here, it 
seems</strong></del></span> <span class="inserted"><ins><em>the modem 
processor</em></ins></span> that <span class="removed"><del><strong>this
+  does not operate via</strong></del></span> the <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>local phone
+    company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-    can &ldquo;upload files&rdquo; as well as</em></ins></span> forcibly <span 
class="removed"><del><strong>and remotely</strong></del></span> install <span 
class="removed"><del><strong>apps&lt;/a&gt; through Google Play.
-  This</strong></del></span>
-    <span class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has 
a</em></ins></span> back door that <span class="removed"><del><strong>we know 
nearly</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    can &ldquo;upload files&rdquo; as well as forcibly install
+    apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>not 
equivalent to</strong></del></span> <span class="inserted"><ins><em>used by 
14,000 Android applications.&lt;/p&gt;
+    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has</em></ins></span> a universal back <span 
class="removed"><del><strong>door, but permits various
-  dirty tricks.
-  &lt;/p&gt;
+    A Chinese version of Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
+    all
+  <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> <span class="inserted"><ins><em>have 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#universal-back-door"&gt;
+  lots of bugs</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;
+    universal back door</em></ins></span> in the <span 
class="removed"><del><strong>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;p&gt;
-  Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;. Nearly
-    all models</em></ins></span> of <span class="removed"><del><strong>this 
power has not been
-  malicious so far,</strong></del></span> <span 
class="inserted"><ins><em>mobile phones have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
-    universal back door in</em></ins></span> the <span 
class="removed"><del><strong>point</strong></del></span> <span 
class="inserted"><ins><em>modem chip&lt;/a&gt;. So why did Coolpad bother
-    to introduce another? Because this one</em></ins></span> is <span 
class="removed"><del><strong>that nobody should have such power,
-  which could also be used maliciously.  You might well decide to 
let</strong></del></span> <span class="inserted"><ins><em>controlled by 
Coolpad.&lt;/p&gt;
+&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note that</strong></del></span> <span 
class="inserted"><ins><em>modem chip&lt;/a&gt;. So why did Coolpad bother
+    to introduce another? Because</em></ins></span> this <span 
class="removed"><del><strong>article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>one is controlled by 
Coolpad.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201403120.1"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120.1"&gt;
     &lt;p id="samsung"&gt;&lt;a
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-    Samsung Galaxy devices running proprietary Android versions come 
with</em></ins></span>
-    a
-  <span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs</strong></del></span> <span 
class="inserted"><ins><em>back door&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>it
-  considers malicious.  But there is no excuse for allowing 
it</strong></del></span> <span class="inserted"><ins><em>provides remote 
access</em></ins></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
the <span class="removed"><del><strong>programs, and you should 
have</strong></del></span> <span class="inserted"><ins><em>files stored 
on</em></ins></span>
-    the <span class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>device.&lt;/p&gt;
+    Samsung Galaxy devices running proprietary Android versions 
come</em></ins></span> with <span class="removed"><del><strong>spyware sending 
lots of data</strong></del></span>
+    <span class="inserted"><ins><em>a back door&lt;/a&gt; that provides remote 
access</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's app listens all</strong></del></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span> <span class="inserted"><ins><em>files 
stored</em></ins></span> on <span class="removed"><del><strong>what people are 
listening to</strong></del></span>
+    <span class="inserted"><ins><em>the device.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
 
-&lt;p&gt;Digital restrictions management, or &ldquo;DRM,&rdquo; 
refers</em></ins></span> to
-  <span class="removed"><del><strong>decide who (if 
anyone)</strong></del></span>
-<span class="inserted"><ins><em>functionalities designed</em></ins></span> to 
<span class="removed"><del><strong>trust</strong></del></span> <span 
class="inserted"><ins><em>restrict what users can do with the 
data</em></ins></span>
-in <span class="removed"><del><strong>this way.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>their 
computers.&lt;/p&gt;
+&lt;p&gt;Digital restrictions management,</em></ins></span> or <span 
class="removed"><del><strong>watching&lt;/a&gt;. In addition, it may
+  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;DRM,&rdquo; refers</em></ins></span> to <span 
class="removed"><del><strong>serve them</strong></del></span>
+<span class="inserted"><ins><em>functionalities designed to restrict what 
users can do</em></ins></span> with <span class="removed"><del><strong>targeted
+  advertisements.&lt;/p&gt;
+&lt;/li&gt;
+
+
+&lt;li&gt;
+  &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>the data
+in their computers.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201501030"&gt;
-    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android app &lt;a
-    
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
-    forces the use of Google DNS&lt;/a&gt;. This is one of the methods that
+    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
+    forces</em></ins></span> the <span class="removed"><del><strong>privacy 
and</strong></del></span> <span class="inserted"><ins><em>use of Google 
DNS&lt;/a&gt;. This is one of the methods that
     Netflix uses to enforce the geolocation restrictions dictated by the
-    movie studios.&lt;/p&gt;</em></ins></span>
+    movie studios.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Mobile 
Insecurity&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="insecurity"&gt;Insecurity&lt;/h3&gt;</em></ins></span>
+&lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
   they do not count as malware. We mention them to refute the
   supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Siri, Alexa, and all</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201908020"&gt;
     &lt;p&gt;Out of 21 gratis Android antivirus apps
     that were tested by security researchers, eight &lt;a
@@ -316,31 +395,26 @@
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa, and all</em></ins></span> the other voice-control 
systems can be &lt;a <span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
-    hijacked</em></ins></span> by programs that play commands in ultrasound 
that humans
-    can't <span class="removed"><del><strong>hear&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hear&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
+    
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
+    hijacked by programs that play commands in ultrasound that humans
+    can't hear&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201807020"&gt;
+  &lt;li id="M201807020"&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
     photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201704050"&gt;</em></ins></span>
+  &lt;li id="M201704050"&gt;
     &lt;p&gt;Many Android devices &lt;a
     
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
     can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
     Broadcom's non-free firmware.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702170"&gt;
+  &lt;li id="M201702170"&gt;
     &lt;p&gt;The mobile apps for communicating &lt;a
     
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
     a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
@@ -351,16 +425,14 @@
     off the tracking.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201701270"&gt;</em></ins></span>
+  &lt;li id="M201701270"&gt;
     &lt;p&gt;Samsung phones &lt;a
     
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
     a security hole that allows an SMS message to install
     ransomware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701130"&gt;
+  &lt;li id="M201701130"&gt;
     &lt;p&gt;WhatsApp has a feature that &lt;a
     
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
     has been described as a &ldquo;back door&rdquo;&lt;/a&gt; because it would
@@ -398,22 +470,16 @@
     taking control of those systems&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201603100"&gt;</em></ins></span>
+  &lt;li id="M201603100"&gt;
     &lt;p&gt;Many proprietary payment apps &lt;a
-<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;transmit</em></ins></span>
+    
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;transmit
     personal data in an insecure way&lt;/a&gt;. However,
     the worse aspect of these apps is that &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not <span 
class="removed"><del><strong>anonymous&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>anonymous&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not
+    anonymous&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA can tap</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505294"&gt;
+  &lt;li id="M201505294"&gt;
     &lt;p&gt;&lt;a
     
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
     Many smartphone apps use insecure authentication methods when storing
@@ -446,59 +512,34 @@
   &lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-    The NSA can tap</em></ins></span> data in smart phones, including iPhones,
+    The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
     detail here, it seems that this does not operate via
     the universal back door that we know nearly all portable
-    phones have. It may involve exploiting various bugs.  There are &lt;a 
<span 
class="removed"><del><strong>href="#universal-back-door"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;</em></ins></span>
+    phones have. It may involve exploiting various bugs.  There are &lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
     lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;h3 <span class="removed"><del><strong>id="surveillance"&gt;Mobile 
Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The Sarahah app 
-      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book to developer's server.  Note that this article 
misuses</strong></del></span> <span 
class="inserted"><ins><em>id="interference"&gt;Interference&lt;/h3&gt;
-
-&lt;p&gt;This section gives examples of mobile apps harassing or 
annoying</em></ins></span>
-the <span class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;h3 id="interference"&gt;Interference&lt;/h3&gt;
   
-  &lt;li&gt;&lt;p&gt;Some portable</strong></del></span> <span 
class="inserted"><ins><em>user, or causing trouble for the user.  These actions 
are like
+&lt;p&gt;This section gives examples of mobile apps harassing or annoying
+the user, or causing trouble for the user.  These actions are like
 sabotage but the word &ldquo;sabotage&rdquo; is too strong for them.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901110"&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones <span 
class="removed"><del><strong>&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold</strong></del></span> <span class="inserted"><ins><em>come 
preloaded</em></ins></span> with <span class="removed"><del><strong>spyware 
sending lots</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Samsung phones come preloaded with &lt;a
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
-    a version</em></ins></span> of <span class="removed"><del><strong>data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Facebook's app listens all</strong></del></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-  on what people are listening to or watching&lt;/a&gt;. In addition, it 
may</strong></del></span> <span class="inserted"><ins><em>Facebook app that 
can't</em></ins></span> be <span class="removed"><del><strong>analyzing 
people's conversations to serve them with targeted
-  advertisements.&lt;/p&gt;
-&lt;/li&gt;
-
-
-&lt;li&gt;
-  &lt;p&gt;A</strong></del></span> <span 
class="inserted"><ins><em>deleted&lt;/a&gt;.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated the 
privacy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app"&gt;
+    a version of the Facebook app that can't be deleted&lt;/a&gt;. &lt;a
+    
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app"&gt;
     Facebook claims this is a stub&lt;/a&gt; which doesn't do anything, but we
-    have to take their word for it,</em></ins></span> and <span 
class="removed"><del><strong>security
-    of 283 Android VPN apps concluded</strong></del></span> <span 
class="inserted"><ins><em>there is the permanent risk</em></ins></span> that 
<span class="removed"><del><strong>&ldquo;in spite of</strong></del></span>
-    the
-    <span class="removed"><del><strong>promises for privacy, security, and 
anonymity given</strong></del></span> <span class="inserted"><ins><em>app will 
be activated by an automatic update.&lt;/p&gt;
+    have to take their word for it, and there is the permanent risk that
+    the app will be activated by an automatic update.&lt;/p&gt;
 
     &lt;p&gt;Preloading crapware along with a nonfree operating system is 
common
-    practice, but</em></ins></span> by <span 
class="inserted"><ins><em>making</em></ins></span> the
-    <span class="removed"><del><strong>majority of VPN apps&mdash;millions 
of</strong></del></span> <span class="inserted"><ins><em>crapware undeletable, 
Facebook and Samsung (&lt;a
+    practice, but by making the crapware undeletable, Facebook and Samsung 
(&lt;a
     class="not-a-duplicate"
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
     are going one step further in their hijacking of users' devices.&lt;/p&gt;
@@ -962,10 +1003,10 @@
   &lt;li id="M201611160"&gt;
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated the privacy and security of
+    research paper&lt;/a&gt; that investigated the privacy 
and</em></ins></span> security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of</em></ins></span> users may be unawarely subject to 
poor security
+    apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Following is a non-exhaustive <span 
class="removed"><del><strong>list</strong></del></span> <span 
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
@@ -1472,7 +1513,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -1483,7 +1524,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/11/19 09:01:34 $
+$Date: 2020/01/20 19:04:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary/po/malware-mobiles.de.po        18 Nov 2019 15:05:17 -0000      
1.127
+++ proprietary/po/malware-mobiles.de.po        20 Jan 2020 19:04:00 -0000      
1.128
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -315,6 +315,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -2481,14 +2505,14 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
 

Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary/po/malware-mobiles.es.po        23 Nov 2019 11:33:15 -0000      
1.159
+++ proprietary/po/malware-mobiles.es.po        20 Jan 2020 19:04:00 -0000      
1.160
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -240,6 +241,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -2139,8 +2164,14 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "

Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary/po/malware-mobiles.fr.po        18 Nov 2019 17:15:32 -0000      
1.182
+++ proprietary/po/malware-mobiles.fr.po        20 Jan 2020 19:04:00 -0000      
1.183
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -237,6 +238,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -2139,8 +2164,14 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
 

Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/malware-mobiles.it-diff.html 19 Nov 2019 09:01:34 -0000      
1.76
+++ proprietary/po/malware-mobiles.it-diff.html 20 Jan 2020 19:04:00 -0000      
1.77
@@ -230,12 +230,7 @@
 
 &lt;div id="TOC"&gt;
 &lt;h3&gt;Types</em></ins></span> of <span class="removed"><del><strong>a 
bug</strong></del></span> <span 
class="inserted"><ins><em>malware</em></ins></span> in
-       <span class="removed"><del><strong>Broadcom's non-free 
firmware.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Samsung
-phones</strong></del></span> <span class="inserted"><ins><em>mobiles&lt;/h3&gt;
+       <span class="removed"><del><strong>Broadcom's non-free 
firmware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>mobiles&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
@@ -254,62 +249,72 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M209900001"&gt;
-    &lt;p&gt;See above for the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have</strong></del></span>
 <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;general 
universal back
+    &lt;p&gt;See above for the &lt;a 
href="#universal-back-door-phone-modem"&gt;general universal back
     door&lt;/a&gt; in essentially all mobile phones, which permits converting
-    them into full-time listening devices.&lt;/p&gt;
+    them into full-time listening devices.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201908270"&gt;
-    &lt;p&gt;A very popular app found in the
-    Google Play store contained</em></ins></span> a <span 
class="removed"><del><strong>security hole</strong></del></span> <span 
class="inserted"><ins><em>module</em></ins></span> that <span 
class="removed"><del><strong>allows an SMS message</strong></del></span> <span 
class="inserted"><ins><em>was designed</em></ins></span> to <span 
class="removed"><del><strong>install
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202001090"&gt;
+    &lt;p&gt;Android</em></ins></span> phones <span 
class="inserted"><ins><em>subsidized by the US government come 
with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and</em></ins></span> a <span 
class="removed"><del><strong>security hole that allows</strong></del></span> 
<span class="inserted"><ins><em>back door for forcing installation of
+    apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is in a modified version of</em></ins></span> an <span 
class="removed"><del><strong>SMS message</strong></del></span>
+    <span class="inserted"><ins><em>essential system configuration app. The 
back door is a
+    surreptitious addition</em></ins></span> to <span 
class="removed"><del><strong>install
 ransomware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Many proprietary payment apps</strong></del></span> &lt;a
+&lt;p&gt;Many proprietary payment apps</strong></del></span> <span 
class="inserted"><ins><em>a program whose stated purpose is to be 
a</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit personal data in an insecure way&lt;/a&gt;.
-However,</strong></del></span>
+transmit personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is</em></ins></span> in 
<span class="removed"><del><strong>an insecure way&lt;/a&gt;.
+However,</strong></del></span> <span class="inserted"><ins><em>addition 
to</em></ins></span> the <span class="removed"><del><strong>worse 
aspect</strong></del></span>
+    <span class="inserted"><ins><em>malware</em></ins></span> of <span 
class="removed"><del><strong>these apps is</strong></del></span> <span 
class="inserted"><ins><em>Android itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908270"&gt;
+    &lt;p&gt;A very popular app found in the
+    Google Play store contained a module</em></ins></span> that <span 
class="inserted"><ins><em>was designed to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
-    install malware on</em></ins></span> the <span 
class="removed"><del><strong>worse aspect of these apps</strong></del></span> 
<span class="inserted"><ins><em>user's computer&lt;/a&gt;. The app developers
-    regularly used it to make the computer download and execute any code
+    install malware on the user's computer&lt;/a&gt;.</em></ins></span> The 
<span class="removed"><del><strong>NSA can tap data in smart phones, including 
iPhones, Android,</strong></del></span> <span class="inserted"><ins><em>app 
developers
+    regularly used it to make the computer download</em></ins></span> and
+  <span class="removed"><del><strong>BlackBerry&lt;/a&gt;. While 
there</strong></del></span> <span class="inserted"><ins><em>execute any code
     they wanted.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span class="inserted"><ins><em>a 
concrete example of what users are exposed to when they
-    run nonfree apps. They can never be completely sure</em></ins></span> that
-<span class="removed"><del><strong>&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;payment</strong></del></span>
 <span class="inserted"><ins><em>a nonfree
-    app</em></ins></span> is <span class="removed"><del><strong>not 
anonymous&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>safe.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>not 
much detail here, it seems</strong></del></span> <span 
class="inserted"><ins><em>a concrete example of what users are exposed to when 
they
+    run nonfree apps. They can never be completely sure</em></ins></span> that 
<span class="removed"><del><strong>this
+  does not operate via</strong></del></span> <span class="inserted"><ins><em>a 
nonfree
+    app is safe.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA can tap data</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609130"&gt;
+  &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
     
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;
-    a universal back door</em></ins></span> in <span 
class="removed"><del><strong>smart phones, including iPhones, Android, and
-  BlackBerry&lt;/a&gt;. While there is not much detail here, it seems that this
-  does not operate via</strong></del></span> the <span 
class="inserted"><ins><em>application processor, for Xiaomi's
+    a universal back door in</em></ins></span> the <span 
class="inserted"><ins><em>application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the</em></ins></span>
-    universal back door <span class="removed"><del><strong>that we know nearly 
all
-  portable phones have. It may involve exploiting various bugs. There are
-  &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-  lots of bugs</strong></del></span> in the <span 
class="removed"><del><strong>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>modem processor that the local phone
-    company can use&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    universal back door <span class="inserted"><ins><em>in the modem 
processor</em></ins></span> that <span class="removed"><del><strong>we know 
nearly</strong></del></span> <span class="inserted"><ins><em>the local phone
+    company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+  &lt;li id="M201511090"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -320,58 +325,34 @@
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
     A Chinese version of Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
-    all <span class="removed"><del><strong>phone numbers and email 
addresses&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>models of mobile phones have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
-    universal back door</em></ins></span> in <span 
class="removed"><del><strong>user's address
-      book to developer's server.  Note that this article 
misuses</strong></del></span> the <span class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>modem chip&lt;/a&gt;. So why did Coolpad bother
-    to introduce another? Because this one is controlled by 
Coolpad.&lt;/p&gt;</em></ins></span>
+    all
+  <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span 
class="removed"><del><strong>have.</strong></del></span> <span 
class="inserted"><ins><em>have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
+    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
+    to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201403120.1"&gt;
+  &lt;li id="M201403120.1"&gt;
     &lt;p id="samsung"&gt;&lt;a
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-    Samsung Galaxy devices running proprietary Android versions 
come</em></ins></span> with <span class="removed"><del><strong>spyware sending 
lots of data</strong></del></span>
-    <span class="inserted"><ins><em>a back door&lt;/a&gt; that provides remote 
access</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Facebook's app listens all</strong></del></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span> <span class="inserted"><ins><em>files 
stored</em></ins></span> on <span class="removed"><del><strong>what people are 
listening to</strong></del></span>
-    <span class="inserted"><ins><em>the device.&lt;/p&gt;
+    Samsung Galaxy devices running proprietary Android versions come with
+    a back door&lt;/a&gt; that provides remote access to the files stored on
+    the device.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
 
-&lt;p&gt;Digital restrictions management,</em></ins></span> or <span 
class="removed"><del><strong>watching&lt;/a&gt;. In addition, it may
-  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;DRM,&rdquo; refers</em></ins></span> to <span 
class="removed"><del><strong>serve them</strong></del></span>
-<span class="inserted"><ins><em>functionalities designed to restrict what 
users can do</em></ins></span> with <span class="removed"><del><strong>targeted
-  advertisements.&lt;/p&gt;
-&lt;/li&gt;
-
-
-&lt;li&gt;
-  &lt;p&gt;A
-    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</strong></del></span> the 
<span class="removed"><del><strong>privacy and security
-    of 283</strong></del></span> <span class="inserted"><ins><em>data
+&lt;p&gt;Digital restrictions management, or &ldquo;DRM,&rdquo; refers to
+functionalities designed to restrict what users can do with the data
 in their computers.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201501030"&gt;
-    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix</em></ins></span> 
Android <span class="removed"><del><strong>VPN apps concluded that &ldquo;in 
spite of the
-    promises for privacy, security, and anonymity given 
by</strong></del></span> <span class="inserted"><ins><em>app &lt;a
+    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android app &lt;a
     
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
-    forces</em></ins></span> the
-    <span class="removed"><del><strong>majority of VPN 
apps&mdash;millions</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> of <span 
class="removed"><del><strong>users may be unawarely subject
-    to poor security guarantees and abusive practices inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>Google DNS&lt;/a&gt;. This</em></ins></span> is <span 
class="removed"><del><strong>a non-exhaustive list</strong></del></span> <span 
class="inserted"><ins><em>one</em></ins></span> of <span 
class="removed"><del><strong>proprietary VPN apps from</strong></del></span> 
the <span class="removed"><del><strong>research paper</strong></del></span> 
<span class="inserted"><ins><em>methods</em></ins></span> that <span 
class="removed"><del><strong>tracks and infringes</strong></del></span>
-    <span class="inserted"><ins><em>Netflix uses to enforce</em></ins></span> 
the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>geolocation restrictions dictated by the
+    forces the use of Google DNS&lt;/a&gt;. This is one of the methods that
+    Netflix uses to enforce the geolocation restrictions dictated by the
     movie studios.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -379,16 +360,8 @@
 
 &lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike the 
rest</em></ins></span> of
-    <span class="removed"><del><strong>users:&lt;/p&gt;
-
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such</strong></del></span> <span 
class="inserted"><ins><em>the file
-  they do not count</em></ins></span> as <span 
class="removed"><del><strong>NativeX and Appflood,
-      meant to track users and show</strong></del></span> <span 
class="inserted"><ins><em>malware. We mention</em></ins></span> them <span 
class="removed"><del><strong>targeted ads.&lt;/dd&gt;
-
-    &lt;dt&gt;sFly Network</strong></del></span> <span 
class="inserted"><ins><em>to refute the
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+  they do not count as malware. We mention them to refute the
   supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
@@ -402,13 +375,14 @@
     risky than the average of the 100 most popular Android apps.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that the article refers to these proprietary 
apps as
-    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    &ldquo;free&rdquo;.</em></ins></span> It <span 
class="removed"><del><strong>may involve exploiting various bugs. There 
are</strong></del></span> <span class="inserted"><ins><em>should have said 
&ldquo;gratis&rdquo;
     instead.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
-    
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
+    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can 
be</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+  lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -967,15 +941,31 @@
     along with the headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    If the fine print</em></ins></span> of <span 
class="removed"><del><strong>bugs in</strong></del></span> the <span 
class="removed"><del><strong>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The Sarahah</strong></del></span> app <span 
class="inserted"><ins><em>said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note that this article misuses</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
+    the <span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs</em></ins></span> of <span 
class="inserted"><ins><em>Android apps can collude
+    to transmit users' personal</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -983,14 +973,15 @@
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon the same information
+    announced an opt-in proprietary search</em></ins></span> app <span 
class="removed"><del><strong>listens all</strong></del></span> <span 
class="inserted"><ins><em>that it will&lt;/a&gt; pre-install
+    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
-    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
+  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
@@ -999,7 +990,8 @@
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data</em></ins></span> to <span class="removed"><del><strong>serve 
them with targeted
+  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -1009,10 +1001,13 @@
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611160"&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;</em></ins></span>
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
@@ -1021,16 +1016,20 @@
     apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
+    &lt;p&gt;Following is a non-exhaustive <span 
class="removed"><del><strong>list</strong></del></span> <span 
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
+    of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN 
apps <span class="removed"><del><strong>from
+    the research paper</strong></del></span> that <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>track users</em></ins></span> and <span 
class="removed"><del><strong>infringes the privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;</strong></del></span> <span class="inserted"><ins><em>infringe 
their
     privacy:&lt;/p&gt;
 
-    &lt;dl class="compact"&gt;
+    &lt;dl class="compact"&gt;</em></ins></span>
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
       meant to track users and show them targeted ads.&lt;/dd&gt;
 
-      &lt;dt&gt;sFly Network</em></ins></span> Booster&lt;/dt&gt;
+      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
       permissions upon installation, meaning it has full access to users'
       text messages.&lt;/dd&gt;
@@ -1519,7 +1518,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -1530,7 +1529,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/11/19 09:01:34 $
+$Date: 2020/01/20 19:04:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary/po/malware-mobiles.it.po        18 Nov 2019 15:05:17 -0000      
1.127
+++ proprietary/po/malware-mobiles.it.po        20 Jan 2020 19:04:01 -0000      
1.128
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -301,6 +301,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -2265,13 +2289,13 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 

Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary/po/malware-mobiles.ja-diff.html 31 Dec 2019 01:04:21 -0000      
1.93
+++ proprietary/po/malware-mobiles.ja-diff.html 20 Jan 2020 19:04:01 -0000      
1.94
@@ -227,7 +227,9 @@
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div id="TOC"&gt;
-&lt;h3&gt;Types of malware</em></ins></span> in <span 
class="removed"><del><strong>smart</strong></del></span> <span 
class="inserted"><ins><em>mobiles&lt;/h3&gt;
+&lt;h3&gt;Types of malware</em></ins></span> in <span 
class="removed"><del><strong>smart phones, including iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there is not much detail here, it seems that this
+  does not operate via</strong></del></span> <span 
class="inserted"><ins><em>mobiles&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
@@ -246,39 +248,68 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M209900001"&gt;
-    &lt;p&gt;See above for the &lt;a 
href="#universal-back-door-phone-modem"&gt;general universal back
-    door&lt;/a&gt; in essentially all mobile</em></ins></span> phones, <span 
class="removed"><del><strong>including iPhones, Android,</strong></del></span> 
<span class="inserted"><ins><em>which permits converting
+    &lt;p&gt;See above for</em></ins></span> the <span 
class="inserted"><ins><em>&lt;a 
href="#universal-back-door-phone-modem"&gt;general</em></ins></span> universal 
back <span class="removed"><del><strong>door that we know 
nearly</strong></del></span>
+    <span class="inserted"><ins><em>door&lt;/a&gt; in 
essentially</em></ins></span> all
+  <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>mobile phones, which permits converting
     them into full-time listening devices.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201908270"&gt;
-    &lt;p&gt;A very popular app found in the
-    Google Play store contained a module that was designed to &lt;a
+  &lt;li id="M202001090"&gt;
+    &lt;p&gt;Android</em></ins></span> phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> <span class="inserted"><ins><em>subsidized by 
the US government come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+  lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and a back door for forcing 
installation</em></ins></span> of <span 
class="removed"><del><strong>bugs</strong></del></span>
+    <span class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is in a modified version of an
+    essential system configuration app. The back door is a
+    surreptitious addition to a program whose stated purpose is to be a &lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is</em></ins></span> in 
<span class="inserted"><ins><em>addition to</em></ins></span> the <span 
class="removed"><del><strong>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>malware of Android 
itself.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908270"&gt;</em></ins></span>
+    &lt;p&gt;A <span class="removed"><del><strong>half-blind security critique 
of a tracking app: it</strong></del></span> <span 
class="inserted"><ins><em>very popular app</em></ins></span> found <span 
class="inserted"><ins><em>in the
+    Google Play store contained a module</em></ins></span> that <span 
class="removed"><del><strong>&lt;a
+href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
+blatant flaws allowed anyone</strong></del></span> <span 
class="inserted"><ins><em>was designed</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
-    install malware on the user's computer&lt;/a&gt;. The app developers
-    regularly used it to make the computer download</em></ins></span> and
-  <span class="removed"><del><strong>BlackBerry&lt;/a&gt;. While 
there</strong></del></span> <span class="inserted"><ins><em>execute any code
+    install malware</em></ins></span> on <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> user's <span 
class="removed"><del><strong>personal data&lt;/a&gt;.</strong></del></span> 
<span class="inserted"><ins><em>computer&lt;/a&gt;.</em></ins></span> The <span 
class="removed"><del><strong>critique fails entirely to express concern that 
the</strong></del></span> app <span 
class="removed"><del><strong>sends</strong></del></span> <span 
class="inserted"><ins><em>developers
+    regularly used it to make</em></ins></span> the
+<span class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>computer download and execute any code
     they wanted.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>not 
much detail here, it seems</strong></del></span> <span 
class="inserted"><ins><em>a concrete example of what users are exposed to when 
they
-    run nonfree apps. They can never be completely sure</em></ins></span> that 
<span class="removed"><del><strong>this
-  does not operate via</strong></del></span> <span class="inserted"><ins><em>a 
nonfree
-    app is safe.&lt;/p&gt;
+    &lt;p&gt;This is a concrete example of what users are 
exposed</em></ins></span> to <span class="inserted"><ins><em>when they
+    run nonfree apps. They can never be completely sure that</em></ins></span> 
a <span class="removed"><del><strong>server, where the 
&lt;em&gt;developer&lt;/em&gt; gets it all.
+This &ldquo;service&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>nonfree
+    app</em></ins></span> is <span class="inserted"><ins><em>safe.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
     
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;
-    a universal back door in</em></ins></span> the <span 
class="inserted"><ins><em>application processor, for Xiaomi's
+    a universal back door in the application processor,</em></ins></span> for 
<span class="removed"><del><strong>suckers!&lt;/p&gt;
+
+&lt;p&gt;The server surely</strong></del></span> <span 
class="inserted"><ins><em>Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the</em></ins></span>
-    universal back door <span class="inserted"><ins><em>in the modem 
processor</em></ins></span> that <span class="removed"><del><strong>we know 
nearly</strong></del></span> <span class="inserted"><ins><em>the local phone
+    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+    universal back door in the modem processor that the local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
+    &lt;p&gt;Baidu's proprietary Android library, Moplus,</em></ins></span> 
has a <span class="removed"><del><strong>&ldquo;privacy policy,&rdquo; and 
surely it
+is worthless since nearly all of</strong></del></span> <span 
class="inserted"><ins><em>back door that &lt;a
     
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
@@ -289,9 +320,8 @@
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
-    all
-  <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> <span class="inserted"><ins><em>have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
+    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
+    all models of mobile phones have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
     universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
     to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
@@ -926,12 +956,11 @@
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-  lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>bugs in</strong></del></span> <span 
class="inserted"><ins><em>spyware is
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -944,41 +973,34 @@
   &lt;li id="M201611280"&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;</em></ins></span>
+    massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;</em></ins></span>
-    &lt;p&gt;A <span 
class="removed"><del><strong>half-blind</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201611160"&gt;
+    &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated the privacy 
and</em></ins></span> security <span 
class="removed"><del><strong>critique</strong></del></span> of
-    <span class="inserted"><ins><em>283 Android VPN apps concluded that 
&ldquo;in spite of the promises
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
     apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is</em></ins></span> a <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
     of some proprietary VPN apps that track users and infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes</em></ins></span> tracking <span 
class="removed"><del><strong>app:</strong></del></span> <span 
class="inserted"><ins><em>libraries such as NativeX and Appflood,
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
       meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>found that &lt;a
-href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
-blatant flaws allowed anyone</strong></del></span> <span 
class="inserted"><ins><em>has full access</em></ins></span> to <span 
class="removed"><del><strong>snoop on a user's personal 
data&lt;/a&gt;.</strong></del></span> <span class="inserted"><ins><em>users'
+      permissions upon installation, meaning it has full access to users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
@@ -992,34 +1014,30 @@
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users.</em></ins></span> The <span class="removed"><del><strong>critique 
fails entirely</strong></del></span> <span class="inserted"><ins><em>stated 
purpose of the JS injection is</em></ins></span> to <span 
class="removed"><del><strong>express concern</strong></del></span> <span 
class="inserted"><ins><em>display ads. Uses
+      users. The stated purpose of the JS injection is to display ads. Uses
       roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have 
confirmed</em></ins></span> that
-      the <span class="inserted"><ins><em>non-premium version of 
the</em></ins></span> app <span 
class="removed"><del><strong>sends</strong></del></span> <span 
class="inserted"><ins><em>does JavaScript injection for
-      tracking</em></ins></span> the
-<span class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>user and displaying ads.&lt;/dd&gt;
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of</em></ins></span> data to <span 
class="removed"><del><strong>a server, where the &lt;em&gt;developer&lt;/em&gt; 
gets it all.
-This &ldquo;service&rdquo; is</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606050"&gt;
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans your mobile phone's photo collections</em></ins></span> for <span 
class="removed"><del><strong>suckers!&lt;/p&gt;
-
-&lt;p&gt;The server surely has a &ldquo;privacy 
policy,&rdquo;</strong></del></span> <span class="inserted"><ins><em>known 
faces&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>surely it</strong></del></span> 
<span class="inserted"><ins><em>suggests you to share the picture you take 
according to who</em></ins></span> is <span 
class="removed"><del><strong>worthless since nearly</strong></del></span>
-    <span class="inserted"><ins><em>in the frame.&lt;/p&gt;
+    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+    and suggests you to share the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
     known-faces database, which means the pictures are likely to be
@@ -1031,7 +1049,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens</em></ins></span> all <span 
class="inserted"><ins><em>the time, &lt;a
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
     it may be analyzing people's conversations to serve them with targeted
@@ -1041,7 +1059,7 @@
   &lt;li id="M201604250"&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
+    spy on many sorts of data in the phone, and in server accounts,
     it can alter</em></ins></span> them <span 
class="removed"><del><strong>are.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1350,7 +1368,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -1361,7 +1379,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/01/20 19:04:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary/po/malware-mobiles.ja.po        31 Dec 2019 01:04:21 -0000      
1.118
+++ proprietary/po/malware-mobiles.ja.po        20 Jan 2020 19:04:01 -0000      
1.119
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -231,6 +231,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -1703,7 +1727,7 @@
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 

Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary/po/malware-mobiles.pot  18 Nov 2019 11:26:47 -0000      1.93
+++ proprietary/po/malware-mobiles.pot  20 Jan 2020 19:04:01 -0000      1.94
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -180,6 +180,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a "
+"href=\"https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/\";>
 "
+"preinstalled adware and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a "
+"href=\"https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\";>
 "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a "
 
"href=\"https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/\";>secretly
 "
@@ -1426,7 +1449,7 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 

Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary/po/malware-mobiles.ru.po        19 Nov 2019 07:01:50 -0000      
1.216
+++ proprietary/po/malware-mobiles.ru.po        20 Jan 2020 19:04:01 -0000      
1.217
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -233,6 +234,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -2119,8 +2144,14 @@
 
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
+# | Copyright &copy; 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary/po/nl.po        27 Dec 2019 10:34:04 -0000      1.166
+++ proprietary/po/nl.po        20 Jan 2020 19:04:01 -0000      1.167
@@ -5117,6 +5117,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -6183,6 +6207,19 @@
 "such as Carrier IQ</a>."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013,-] 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Malware in Webpages+} - GNU Project - Free
 # | Software Foundation
@@ -6901,11 +6938,11 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015, 2016-] {+2014-2019+} Free Software Foundation,
+# | Copyright &copy; [-2015, 2016-] {+2014-2020+} Free Software Foundation,
 # | Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -7806,17 +7843,17 @@
 "je meestal belazerd."
 
 #. type: Content of: <div><p>
-# | As of [-April,-] {+October,+} 2019, the [-files-] {+pages+} in this
-# | directory list around 400 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 500 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2019,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around 4[-0-]{+5+}0 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2019, the files in this directory list around 400 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -8167,15 +8204,15 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 
@@ -9554,6 +9591,31 @@
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft-malware</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the files in this directory list around 400 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
+#~ "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
+#~ "gevallen waar we niks van weten."
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~ "Inc."
+
 #~ msgid ""
 #~ "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
 #~ "malware</a>"

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/po/pl.po        27 Dec 2019 10:34:04 -0000      1.165
+++ proprietary/po/pl.po        20 Jan 2020 19:04:01 -0000      1.166
@@ -4570,6 +4570,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -5620,6 +5644,16 @@
 "such as Carrier IQ</a>."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013,-] 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Malware in Webpages+} - GNU Project - Free
 # | Software Foundation
@@ -6325,11 +6359,11 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015-] {+2014-2019+} Free Software
+# | Copyright &copy; [-2013, 2014, 2015-] {+2014-2020+} Free Software
 # | Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -7180,7 +7214,7 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -7584,13 +7618,13 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -8974,6 +9008,13 @@
 msgstr "<a href=\"/philosophy/malware-microsoft.html\">Malware Microsoftu</a>"
 
 #, fuzzy
+#~| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
+#, fuzzy
 #~| msgid ""
 #~| "<a href=\"/philosophy/proprietary-drm.html\">Digital restrictions "
 #~| "management</a> or &ldquo;DRM&rdquo; means functionalities designed to "

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- proprietary/po/pot  27 Dec 2019 10:34:04 -0000      1.164
+++ proprietary/po/pot  20 Jan 2020 19:04:01 -0000      1.165
@@ -4285,6 +4285,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -5328,6 +5352,12 @@
 "such as Carrier IQ</a>."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Malware in Webpages - GNU Project - Free Software Foundation"
 msgstr ""
@@ -5970,7 +6000,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <title>
@@ -6639,7 +6669,7 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -6826,8 +6856,8 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary-back-doors.de-diff.html  23 Nov 2019 15:30:43 
-0000      1.37
+++ proprietary/po/proprietary-back-doors.de-diff.html  20 Jan 2020 19:04:01 
-0000      1.38
@@ -362,8 +362,7 @@
   <span class="inserted"><ins><em>&lt;li id="M201907100"&gt;
     &lt;p&gt;Apple appears to say that &lt;a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
-    there is</em></ins></span> a back door <span 
class="removed"><del><strong>that &lt;a
-      
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;</strong></del></span>
 <span class="inserted"><ins><em>in MacOS&lt;/a&gt; for automatically updating 
some
+    there is</em></ins></span> a back door <span 
class="removed"><del><strong>that &lt;a</strong></del></span> <span 
class="inserted"><ins><em>in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
 
     &lt;p&gt;The specific change described in the article was not
@@ -422,8 +421,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
-    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;</em></ins></span>
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a</em></ins></span>
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -475,9 +474,8 @@
   <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;
     &lt;p&gt;The iPhone</em></ins></span> has a back door <span 
class="removed"><del><strong>for</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-    that allows Apple to</em></ins></span> remotely <span 
class="removed"><del><strong>deleting apps&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;You might well decide</strong></del></span> <span 
class="inserted"><ins><em>delete apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for 
Apple</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>have
+    that allows Apple to</em></ins></span> remotely <span 
class="removed"><del><strong>deleting</strong></del></span> <span 
class="inserted"><ins><em>delete apps&lt;/a&gt; which Apple considers
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
     this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -486,12 +484,30 @@
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202001090"&gt;
+    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and a back door for forcing installation 
of</em></ins></span>
+    apps&lt;/a&gt;.&lt;/p&gt;
+    <span class="removed"><del><strong>&lt;p&gt;You might well 
decide</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;The adware is in a modified 
version of an
+    essential system configuration app. The back door is a
+    surreptitious addition</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> a <span 
class="removed"><del><strong>security service</strong></del></span> <span 
class="inserted"><ins><em>program whose stated purpose is to be a &lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is in addition to the
+    malware of Android itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910130.1"&gt;
     &lt;p&gt;The Chinese Communist Party's &lt;a
     href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
     &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt; was found to contain 
&lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>security 
service</strong></del></span> <span class="inserted"><ins><em>back-door 
allowing developers to run any code they wish&lt;/a&gt; in the
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    a back-door allowing developers to run any code they wish&lt;/a&gt; in the
     users' phone, as &ldquo;superusers.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
@@ -887,7 +903,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2018</strong></del></span> <span 
class="inserted"><ins><em>2014-2019</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2018</strong></del></span> <span 
class="inserted"><ins><em>2014-2020</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
@@ -897,7 +913,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/11/23 15:30:43 $
+$Date: 2020/01/20 19:04:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary/po/proprietary-back-doors.de.po 23 Nov 2019 15:30:43 -0000      
1.135
+++ proprietary/po/proprietary-back-doors.de.po 20 Jan 2020 19:04:01 -0000      
1.136
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -798,6 +798,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
 "surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
 "was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
@@ -1414,10 +1438,10 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2014-201[-8-]{+9+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2014-2018-] {+2014-2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 201<ins>3</ins>-2018 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-back-doors.es.po 24 Nov 2019 11:31:59 -0000      
1.30
+++ proprietary/po/proprietary-back-doors.es.po 20 Jan 2020 19:04:01 -0000      
1.31
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
 "PO-Revision-Date: 2019-11-24 11:48+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -671,6 +672,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
 "surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
 "was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
@@ -1180,7 +1205,10 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+# | Copyright &copy; [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary/po/proprietary-back-doors.fr.po 24 Nov 2019 09:35:45 -0000      
1.150
+++ proprietary/po/proprietary-back-doors.fr.po 20 Jan 2020 19:04:01 -0000      
1.151
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
 "PO-Revision-Date: 2019-11-23 17:20+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -677,6 +678,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
 "surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
 "was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
@@ -1186,7 +1211,10 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+# | Copyright &copy; [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/po/proprietary-back-doors.it-diff.html  23 Nov 2019 15:30:43 
-0000      1.64
+++ proprietary/po/proprietary-back-doors.it-diff.html  20 Jan 2020 19:04:01 
-0000      1.65
@@ -289,63 +289,32 @@
     the <span 
class="removed"><del><strong>computer.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus,</strong></del></span>
+    &lt;p&gt;Baidu's proprietary Android library,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201210220"&gt;
     &lt;p id="swindle-eraser"&gt;The Amazon
-    Kindle-Swindle</em></ins></span> has a back door that <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;can
-      &ldquo;upload files&rdquo; as well as forcibly install
-      apps&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
-  &lt;/li&gt;
-  
-&lt;li&gt;&lt;p&gt;ARRIS cable modem</strong></del></span> has <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>been used to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
-    remotely erase books&lt;/a&gt;.  One of</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
-     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span class="inserted"><ins><em>books erased 
was
+    Kindle-Swindle has a back door that has been used to &lt;a
+    
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+    remotely erase books&lt;/a&gt;.  One of the books erased was
     &lt;cite&gt;1984&lt;/cite&gt;, by George Orwell.&lt;/p&gt;
 
-    &lt;p&gt;Amazon responded</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>criticism by saying it
-    would delete books only following orders from</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
-     remotely.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;li&gt;&lt;p&gt;
-Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-intentional local back door for 4 years&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;Users reported</strong></del></span>
-    <span class="inserted"><ins><em>state.  However,</em></ins></span> that 
<span class="inserted"><ins><em>policy didn't last.  In 2012 
it</em></ins></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them to replace Windows 7</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
-    wiped a user's Kindle-Swindle</em></ins></span> and <span 
class="removed"><del><strong>8 with all-spying 
-    Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Microsoft was</strong></del></span> <span 
class="inserted"><ins><em>deleted her account&lt;/a&gt;, then
+    &lt;p&gt;Amazon responded to criticism by saying it
+    would delete books only following orders from the
+    state.  However, that policy didn't last.  In 2012 it &lt;a
+    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
+    wiped a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then
     offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Do other ebook readers have back doors</em></ins></span> in <span 
class="removed"><del><strong>fact &lt;a 
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    attacking computers that run Windows 7</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
-    don't know,</em></ins></span> and <span 
class="removed"><del><strong>8&lt;/a&gt;, switching on a flag 
-    that said whether</strong></del></span> <span class="inserted"><ins><em>we 
have no way</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>find out.  There is no reason</em></ins></span> to 
<span class="removed"><del><strong>Windows 10 when</strong></del></span>
-    <span class="inserted"><ins><em>assume that they don't.&lt;/p&gt;
+    &lt;p&gt;Do other ebook readers have back doors in their nonfree software? 
We
+    don't know, and we have no way to find out.  There is no reason to
+    assume that they don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201011220"&gt;
     &lt;p&gt;The iPhone has a back door for &lt;a
     
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-    remote wipe&lt;/a&gt;.  It's not always enabled, but</em></ins></span> 
users 
-    <span class="removed"><del><strong>had turned</strong></del></span> <span 
class="inserted"><ins><em>are led into
-    enabling</em></ins></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
-
-    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
-    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
-    how</strong></del></span> <span class="inserted"><ins><em>without 
understanding.&lt;/p&gt;
+    remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
+    enabling it without understanding.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -355,32 +324,21 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908270"&gt;
     &lt;p&gt;A very popular app found in the
-    Google Play store contained a module that was designed</em></ins></span> 
to <span class="removed"><del><strong>permanently reject</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    Google Play store contained a module that was designed to &lt;a
     
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
-    install malware on</em></ins></span> the <span 
class="removed"><del><strong>downgrade</strong></del></span> <span 
class="inserted"><ins><em>user's computer&lt;/a&gt;. The app developers
-    regularly used it</em></ins></span> to <span 
class="removed"><del><strong>Windows 
10&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>make the computer download and execute any code
-    they wanted.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="removed"><del><strong>seems to involve 
use</strong></del></span> <span class="inserted"><ins><em>is a concrete 
example</em></ins></span> of <span class="inserted"><ins><em>what users are 
exposed to when they
-    run nonfree apps. They can never be completely sure that</em></ins></span> 
a <span class="removed"><del><strong>back door in Windows 7 and 
8.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>nonfree
-    app is safe.&lt;/p&gt;</em></ins></span>
+    install malware on the user's computer&lt;/a&gt;. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.&lt;/p&gt;
+
+    &lt;p&gt;This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Most mobile phones have a universal back door, which has been 
used</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907100"&gt;
-    &lt;p&gt;Apple appears</em></ins></span> to <span 
class="inserted"><ins><em>say that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-turn them malicious&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android has</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
-    there is</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door&lt;/a&gt;. Nearly all
-models</strong></del></span> <span class="inserted"><ins><em>door in 
MacOS&lt;/a&gt; for automatically updating some
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
 
     &lt;p&gt;The specific change described in the article was not
@@ -393,8 +351,8 @@
     
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
     back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article is full</em></ins></span> of <span 
class="removed"><del><strong>mobile phones</strong></del></span> <span 
class="inserted"><ins><em>confusions, errors and biases that 
we</em></ins></span> have
-    <span class="inserted"><ins><em>an obligation to expose, given that we are 
making a link to them.&lt;/p&gt;
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
 
     &lt;ul&gt;
     &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
@@ -402,15 +360,14 @@
     to do is sue other companies if they do some particular thing in
     their products.&lt;/li&gt;
 
-    &lt;li&gt;A company's policies about when to attack users 
through</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back
-    door <span class="inserted"><ins><em>are beside the point. Inserting the 
back door is wrong</em></ins></span> in the <span 
class="removed"><del><strong>modem chip. So
-why did Coolpad bother</strong></del></span>
-    <span class="inserted"><ins><em>first place, and using the back door is 
always wrong too. No software
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
     developer should have that power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
-    attacking ships. Using that word</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>refer to sharing 
copies</em></ins></span> is <span 
class="removed"><del><strong>controlled</strong></del></span> <span 
class="inserted"><ins><em>a smear;
+    attacking ships. Using that word to refer to sharing copies is a smear;
     please don't smear sharing.&lt;/li&gt;
 
     &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
@@ -423,15 +380,11 @@
     because neighbors' kids are playing on your front yard, and saying
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
     to the boundary line, not even with a jackhammer, because it is an
-    abstraction and can't be affected</em></ins></span> by <span 
class="removed"><del><strong>Coolpad.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>physical 
action.&lt;/p&gt;&lt;/li&gt;
-    &lt;/ul&gt;</em></ins></span>
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    &lt;/ul&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Microsoft Windows</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
+  &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
@@ -444,148 +397,217 @@
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus,</em></ins></span> 
has a <span class="removed"><del><strong>universal</strong></del></span> back 
door <span class="removed"><del><strong>through which</strong></del></span> 
<span class="inserted"><ins><em>that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;</em></ins></span>
-    can <span class="removed"><del><strong>be imposed on the users&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;More information on when</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;upload files&rdquo; as well as forcibly install
+    &lt;p&gt;Baidu's proprietary Android library,</em></ins></span> Moplus, 
has a back door that &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    can</em></ins></span> &ldquo;upload files&rdquo; as well as forcibly 
install
     apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201112080"&gt;
-    &lt;p&gt; In addition to its</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-this was used&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>href="#windows-update"&gt;universal back
-    door&lt;/a&gt;,</em></ins></span> Windows <span 
class="removed"><del><strong>10, the universal</strong></del></span> <span 
class="inserted"><ins><em>8 has a</em></ins></span> back door <span 
class="inserted"><ins><em>for &lt;a
-    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable 
modem</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
+    &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
+    door&lt;/a&gt;, Windows 8</em></ins></span> has a <span 
class="inserted"><ins><em>back door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You might well decide to let a security service that you trust
+    &lt;p&gt;You might well decide</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>let a security service that you trust
     remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
-    But there</em></ins></span> is no <span 
class="removed"><del><strong>longer hidden; all
-&ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>excuse for &lt;em&gt;deleting&lt;/em&gt; the 
programs,</em></ins></span> and <span class="removed"><del><strong>immediately 
imposed&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>you
+    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt;</em></ins></span> 
the <span class="removed"><del><strong>engine&lt;/a&gt;
+     remotely.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>programs, and you
     should have the right to decide whom (if anyone) to trust in this
     way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;German 
government</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+Mac OS X had an</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;
-    &lt;p&gt;In Android,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-away from Windows 8 computers with TPM 2.0 due to 
potential</strong></del></span>
+    &lt;p&gt;In Android,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google has a</em></ins></span> back door <span 
class="removed"><del><strong>capabilities</strong></del></span> <span 
class="inserted"><ins><em>to remotely delete apps&lt;/a&gt;. (It was in a
+    Google has a</em></ins></span> back door <span 
class="removed"><del><strong>for 4 years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users reported that &lt;a 
+    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them</strong></del></span> to <span 
class="removed"><del><strong>replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft</strong></del></span> <span 
class="inserted"><ins><em>remotely delete apps&lt;/a&gt;. (It</em></ins></span> 
was in <span class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>a
     program called GTalkService, which seems since then to have been
     merged into Google Play.)&lt;/p&gt;
 
-    &lt;p&gt;Google can also &lt;a
-    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  This is
+    &lt;p&gt;Google can also</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers that run Windows 7</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+    forcibly</em></ins></span> and <span 
class="removed"><del><strong>8&lt;/a&gt;, switching on</strong></del></span> 
<span class="inserted"><ins><em>remotely install apps&lt;/a&gt; through 
GTalkService.  This is
     not equivalent to a universal back door, but permits various dirty
     tricks.&lt;/p&gt;
 
-    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt;</em></ins></span> 
of <span class="inserted"><ins><em>this power has not been
-    malicious so far,</em></ins></span> the <span 
class="removed"><del><strong>TPM 2.0 
chip&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>point is that nobody should have such power,
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
+    malicious so far, the point is that nobody should have such power,
     which could also be used maliciously.  You might well decide to
-    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for allowing it to
-    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
-    who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
+    let</em></ins></span> a <span 
class="removed"><del><strong>flag</strong></del></span> <span 
class="inserted"><ins><em>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs</em></ins></span> that <span 
class="removed"><del><strong>said whether to &ldquo;upgrade&rdquo; to Windows 
10 when users 
+    had turned</strong></del></span>
+    it <span class="removed"><del><strong>off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how</strong></del></span> <span class="inserted"><ins><em>considers 
malicious.  But there is no excuse for allowing it</em></ins></span> to <span 
class="removed"><del><strong>permanently reject</strong></del></span>
+    <span class="inserted"><ins><em>&lt;em&gt;delete&lt;/em&gt; the programs, 
and you should have</em></ins></span> the <span 
class="removed"><del><strong>downgrade</strong></del></span> <span 
class="inserted"><ins><em>right</em></ins></span> to <span 
class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>decide
+    who (if anyone)</em></ins></span> to <span 
class="removed"><del><strong>involve use of a back door</strong></del></span> 
<span class="inserted"><ins><em>trust</em></ins></span> in <span 
class="removed"><del><strong>Windows 7 and 8.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>this way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Most mobile phones have</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
-    &lt;p&gt;The iPhone has a back door &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;
+    &lt;p&gt;The iPhone has</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door,</strong></del></span> <span 
class="inserted"><ins><em>door &lt;a
     
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-    that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's <span 
class="removed"><del><strong>ok</strong></del></span> <span 
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
-    this power because of course we can trust <span 
class="removed"><del><strong>Apple.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    that allows Apple to remotely delete apps&lt;/a&gt;</em></ins></span> 
which <span class="removed"><del><strong>has been used</strong></del></span> 
<span class="inserted"><ins><em>Apple considers
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for 
Apple</em></ins></span> to
+<span class="removed"><del><strong>&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A Chinese version</strong></del></span> <span class="inserted"><ins><em>have
+    this power because</em></ins></span> of <span 
class="removed"><del><strong>Android has</strong></del></span> <span 
class="inserted"><ins><em>course we can trust Apple.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201910130.1"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &lt;a
+  &lt;li id="M202001090"&gt;
+    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door&lt;/a&gt;. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>door for forcing 
installation</em></ins></span> of <span class="removed"><del><strong>mobile 
phones have</strong></del></span>
+    <span class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is in</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>modified version of an
+    essential system configuration app. The</em></ins></span> back door <span 
class="removed"><del><strong>in the modem chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>is a
+    surreptitious addition</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>a program whose 
stated purpose</em></ins></span> is <span 
class="removed"><del><strong>controlled
+by Coolpad.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Microsoft Windows has</strong></del></span> <span 
class="inserted"><ins><em>to be</em></ins></span> a <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;</em></ins></span>
+    universal back door <span class="removed"><del><strong>through 
which</strong></del></span> <span class="inserted"><ins><em>for 
firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is in addition to the
+    malware of Android itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130.1"&gt;
+    &lt;p&gt;The Chinese Communist Party's &lt;a
     href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
-    &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt; was found to contain 
&lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    a back-door allowing developers to run any code they wish&lt;/a&gt; in the
-    users' phone, as &ldquo;superusers.&rdquo;&lt;/p&gt;
+    &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt; was found to 
contain</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    a back-door allowing developers to run</em></ins></span> any <span 
class="removed"><del><strong>change whatsoever can be imposed 
on</strong></del></span> <span class="inserted"><ins><em>code they 
wish&lt;/a&gt; in</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;More information on when</strong></del></span>
+    <span class="inserted"><ins><em>users' phone, as 
&ldquo;superusers.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Note: The &lt;a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+this was used&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;In Windows 10,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
     Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
     readable after copy-pasting in a text editor) includes a clarification
     saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
+    of</em></ins></span> the <span class="inserted"><ins><em>app, and that, 
according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908220"&gt;
     &lt;p&gt;ChromeBooks are programmed for obsolescence:
-    ChromeOS</em></ins></span> has a <span 
class="inserted"><ins><em>universal</em></ins></span> back door <span 
class="inserted"><ins><em>that is used</em></ins></span> for
-<span class="removed"><del><strong>&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
-it without understanding.
+    ChromeOS has a</em></ins></span> universal back door <span 
class="inserted"><ins><em>that</em></ins></span> is <span 
class="removed"><del><strong>no longer hidden; all
+&ldquo;upgrades&rdquo; will
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>used for updates</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>updates</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones</strong></del></span>
+&lt;li&gt;&lt;p&gt;German government</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+away from Windows 8 computers with TPM 2.0 due</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
-    ceases to operate at a predefined date&lt;/a&gt;. From then on, there
-    appears to be no support whatsoever</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;
+    ceases</em></ins></span> to <span 
class="removed"><del><strong>potential</strong></del></span> <span 
class="inserted"><ins><em>operate at a predefined date&lt;/a&gt;. From then on, 
there
+    appears to be no support whatsoever for the computer.&lt;/p&gt;
 
-    &lt;p&gt;In other words, when you stop getting screwed by the back door,
-    you start getting screwed by the obsolescence.&lt;/p&gt;
+    &lt;p&gt;In other words, when you stop getting screwed by 
the</em></ins></span> back
+<span class="removed"><del><strong>door capabilities of</strong></del></span> 
<span class="inserted"><ins><em>door,
+    you start getting screwed by</em></ins></span> the <span 
class="removed"><del><strong>TPM 2.0 
chip&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obsolescence.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>FordPass Connect feature of some Ford 
vehicles</em></ins></span> has <span class="removed"><del><strong>a back 
door</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+that allows Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for 
Apple</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>improved with</strong></del></span> <span 
class="inserted"><ins><em>you succeeded in breaking the
+    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>this power
+because</strong></del></span> <span class="inserted"><ins><em>you succeeded in 
breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;New GM cars &lt;a
+    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
+    offer the feature</em></ins></span> of <span 
class="removed"><del><strong>course we can trust Apple.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a universal 
back door&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Every nonfree program offers the user zero</em></ins></span> 
security <span class="removed"><del><strong>improvements&lt;/a&gt;; 
but</strong></del></span> <span class="inserted"><ins><em>against its
+    &lt;p&gt;Every nonfree program offers the user zero security against its
     developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;
+    worse.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711244"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>back door for
+&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span> <span 
class="inserted"><ins><em>product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
     listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -927,7 +949,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2017</strong></del></span> <span 
class="inserted"><ins><em>2014-2019</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2017</strong></del></span> <span 
class="inserted"><ins><em>2014-2020</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -938,7 +960,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/11/23 15:30:43 $
+$Date: 2020/01/20 19:04:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary/po/proprietary-back-doors.it.po 23 Nov 2019 15:30:43 -0000      
1.128
+++ proprietary/po/proprietary-back-doors.it.po 20 Jan 2020 19:04:01 -0000      
1.129
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -817,6 +817,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
 "surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
 "was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
@@ -1397,10 +1421,10 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2014-201[-7-]{+9+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2014-2017-] {+2014-2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary-back-doors.ja-diff.html  31 Dec 2019 01:04:21 
-0000      1.63
+++ proprietary/po/proprietary-back-doors.ja-diff.html  20 Jan 2020 19:04:01 
-0000      1.64
@@ -272,12 +272,10 @@
   <span class="inserted"><ins><em>&lt;li id="M201210220"&gt;
     &lt;p id="swindle-eraser"&gt;The Amazon
     Kindle-Swindle</em></ins></span> has a back door that <span 
class="inserted"><ins><em>has been used to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;can
-      &ldquo;upload files&rdquo; as well as forcibly install
-      apps&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;It is used</strong></del></span>
+      &ldquo;upload</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
     remotely erase books&lt;/a&gt;.  One of the books erased was
-    &lt;cite&gt;1984&lt;/cite&gt;,</em></ins></span> by <span 
class="removed"><del><strong>14,000 Android 
applications.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>George Orwell.&lt;/p&gt;
+    &lt;cite&gt;1984&lt;/cite&gt;, by George Orwell.&lt;/p&gt;
 
     &lt;p&gt;Amazon responded to criticism by saying it
     would delete books only following orders from the
@@ -288,15 +286,12 @@
 
     &lt;p&gt;Do other ebook readers have back doors in their nonfree software? 
We
     don't know, and we have no way to find out.  There is no reason to
-    assume that they don't.&lt;/p&gt;</em></ins></span>
+    assume that they don't.&lt;/p&gt;
   &lt;/li&gt;
   
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable 
modem</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201011220"&gt;
-    &lt;p&gt;The iPhone</em></ins></span> has a <span 
class="inserted"><ins><em>back door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+  &lt;li id="M201011220"&gt;
+    &lt;p&gt;The iPhone has a back door for &lt;a
+    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
     remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
     enabling it without understanding.&lt;/p&gt;
   &lt;/li&gt;
@@ -307,69 +302,46 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908270"&gt;
-    &lt;p&gt;A very popular app found</em></ins></span> in the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with</strong></del></span>
-    <span class="inserted"><ins><em>Google Play store contained a module that 
was designed to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
+    &lt;p&gt;A very popular app found in the
+    Google Play store contained a module that was designed to &lt;a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
     install malware on the user's computer&lt;/a&gt;. The app developers
-    regularly used it</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
-     remotely.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer download and execute any code
+    regularly used it to make the computer download and execute any code
     they wanted.&lt;/p&gt;
 
     &lt;p&gt;This is a concrete example of what users are exposed to when they
     run nonfree apps. They can never be completely sure that a nonfree
-    app is safe.&lt;/p&gt;</em></ins></span>
+    app is safe.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-Mac OS X had an</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201907100"&gt;
-    &lt;p&gt;Apple appears to say that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-intentional local</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
-    there is a</em></ins></span> back door <span class="inserted"><ins><em>in 
MacOS&lt;/a&gt;</em></ins></span> for <span class="removed"><del><strong>4 
years&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> <span 
class="inserted"><ins><em>automatically updating some
+  &lt;li id="M201907100"&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
 
     &lt;p&gt;The specific change described in the article was not
     malicious&mdash;it protected users from surveillance by third
-    parties&mdash;but</em></ins></span> that <span 
class="inserted"><ins><em>is a separate question.&lt;/p&gt;
+    parties&mdash;but that is a separate question.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
-    back door that can make it cease</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7</strong></del></span> <span 
class="inserted"><ins><em>function&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Corel Paintshop Pro has a &lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article is full of confusions, errors</em></ins></span> and 
<span class="removed"><del><strong>8 with all-spying 
-    Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Microsoft was in fact &lt;a 
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    attacking computers</strong></del></span> <span 
class="inserted"><ins><em>biases</em></ins></span> that <span 
class="removed"><del><strong>run Windows 7 and 8&lt;/a&gt;, switching on a 
flag</strong></del></span> <span class="inserted"><ins><em>we have
-    an obligation to expose, given</em></ins></span> that <span 
class="removed"><del><strong>said whether</strong></del></span> <span 
class="inserted"><ins><em>we are making a link</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
 
     &lt;ul&gt;
-    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a 
company</em></ins></span> to <span class="removed"><del><strong>Windows 10 when 
users 
-    had turned</strong></del></span> <span class="inserted"><ins><em>do
-    any particular thing in its products. What</em></ins></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
-
-    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
-    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
-    how to permanently reject</strong></del></span> <span 
class="inserted"><ins><em>does enable</em></ins></span> the <span 
class="removed"><del><strong>downgrade</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span>
-    to <span class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>do is sue other companies if they do some particular 
thing in
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
     their products.&lt;/li&gt;
 
-    &lt;li&gt;A company's policies about when</em></ins></span> to <span 
class="removed"><del><strong>involve use of</strong></del></span> <span 
class="inserted"><ins><em>attack users through</em></ins></span> a back
-    door <span class="inserted"><ins><em>are beside the point. Inserting the 
back door is wrong</em></ins></span> in <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>the
-    first place,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>using the back door is always wrong too. No software
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
     developer should have that power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
@@ -388,115 +360,135 @@
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
     to the boundary line, not even with a jackhammer, because it is an
     abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
-    &lt;/ul&gt;</em></ins></span>
+    &lt;/ul&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Most mobile phones have</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
+  &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install</em></ins></span> a <span 
class="removed"><del><strong>universal back door, which has been 
used</strong></del></span> <span class="inserted"><ins><em>surveillance 
app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering</em></ins></span> to <span 
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-turn them malicious&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary</em></ins></span> Android <span 
class="inserted"><ins><em>library, Moplus,</em></ins></span> has a <span 
class="removed"><del><strong>universal back door&lt;/a&gt;. Nearly all
-models of mobile phones have a universal</strong></del></span> back door <span 
class="removed"><del><strong>in the modem chip. So
-why did Coolpad bother to introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>that &lt;a
+  &lt;li id="M201511090"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
     
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-    can &ldquo;upload files&rdquo; as well as forcibly install
+    can &ldquo;upload</em></ins></span> files&rdquo; as well as forcibly 
install
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>controlled</strong></del></span> <span 
class="inserted"><ins><em>used</em></ins></span> by <span 
class="removed"><del><strong>Coolpad.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>14,000 
Android applications.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It is <span class="removed"><del><strong>used by 14,000 Android 
applications.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Microsoft</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
+  &lt;li id="M201112080"&gt;
     &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
-    door&lt;/a&gt;,</em></ins></span> Windows <span 
class="inserted"><ins><em>8</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> back door <span 
class="removed"><del><strong>through which</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever can be imposed on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+    door&lt;/a&gt;, Windows 8 has a back door for &lt;a
+    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;You might well decide to let a security service that you trust
     remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
-    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt;</em></ins></span> 
the <span class="removed"><del><strong>users&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;More information on when
-&lt;a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;</strong></del></span>
 <span class="inserted"><ins><em>programs, and you
-    should have the right to decide whom (if anyone) to trust 
in</em></ins></span> this <span class="removed"><del><strong>was used&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>way.&lt;/p&gt;
+    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
+    should have the right to decide whom (if anyone) to trust in this
+    way.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201103070"&gt;</em></ins></span>
-    &lt;p&gt;In <span class="removed"><del><strong>Windows 10, the 
universal</strong></del></span> <span class="inserted"><ins><em>Android, &lt;a
+  &lt;li id="M201103070"&gt;
+    &lt;p&gt;In Android, &lt;a
     
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google has a</em></ins></span> back door <span 
class="removed"><del><strong>is no longer hidden; all
-&ldquo;upgrades&rdquo; will
-be</strong></del></span> <span class="inserted"><ins><em>to remotely delete 
apps&lt;/a&gt;. (It was in a
+    Google has a back door to remotely delete apps&lt;/a&gt;. (It was in a
     program called GTalkService, which seems since then to have been
     merged into Google Play.)&lt;/p&gt;
 
-    &lt;p&gt;Google can also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Windows 8's</strong></del></span> <span 
class="inserted"><ins><em>remotely install apps&lt;/a&gt; through GTalkService. 
 This is
-    not equivalent to a universal</em></ins></span> back <span 
class="removed"><del><strong>doors are</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various dirty
+    &lt;p&gt;Google can also &lt;a
+    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  This is
+    not equivalent to a universal back door, but permits various dirty
     tricks.&lt;/p&gt;
 
     &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
-    malicious</em></ins></span> so <span 
class="removed"><del><strong>gaping</strong></del></span> <span 
class="inserted"><ins><em>far, the point is that nobody should have such power,
+    malicious so far, the point is that nobody should have such power,
     which could also be used maliciously.  You might well decide to
-    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; 
programs</em></ins></span> that
-<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;
-the German government has decided</strong></del></span>
-    it <span class="removed"><del><strong>can't be trusted&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>considers 
malicious.  But there is no excuse for allowing it to
+    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
+    it considers malicious.  But there is no excuse for allowing it to
     &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
     who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;ARRIS cable 
modem</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
-    &lt;p&gt;The iPhone has a back door &lt;a
-    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;
+    &lt;p&gt;The iPhone</em></ins></span> has a <span 
class="inserted"><ins><em>back door</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
     that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's <span 
class="removed"><del><strong>ok</strong></del></span> <span 
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
-    this power because of course we can trust <span 
class="removed"><del><strong>Apple.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;</em></ins></span>
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
+    this power because of course we can trust 
Apple.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Caterpillar 
vehicles</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201910130.1"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &lt;a
+  &lt;li id="M202001090"&gt;
+    &lt;p&gt;Android phones subsidized by the US government</em></ins></span> 
come with &lt;a <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff the engine&lt;/a&gt;
+     remotely.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;li&gt;&lt;p&gt;
+Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and a</em></ins></span> back door for <span 
class="removed"><del><strong>4 years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users reported that &lt;a 
+    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was</strong></del></span> forcing <span 
class="removed"><del><strong>them to replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft was</strong></del></span> <span 
class="inserted"><ins><em>installation of
+    apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is</em></ins></span> in <span 
class="removed"><del><strong>fact &lt;a 
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching 
on</strong></del></span> a <span class="removed"><del><strong>flag 
+    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
+    had turned it off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems to involve use</strong></del></span> <span 
class="inserted"><ins><em>modified version</em></ins></span> of <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>an
+    essential system configuration app. The</em></ins></span> back door <span 
class="removed"><del><strong>in Windows 7 and 8.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Most mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>is a
+    surreptitious addition to a program whose stated purpose is to 
be</em></ins></span> a <span class="inserted"><ins><em>&lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;</em></ins></span>
+    universal back <span class="removed"><del><strong>door, 
which</strong></del></span> <span class="inserted"><ins><em>door for 
firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is 
malicious</em></ins></span> has <span class="removed"><del><strong>been 
used</strong></del></span>
+    <span class="inserted"><ins><em>a secret secondary malicious purpose. All 
this is in addition</em></ins></span> to
+<span class="removed"><del><strong>&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the
+    malware of Android itself.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910130.1"&gt;
+    &lt;p&gt;The</em></ins></span> Chinese <span 
class="inserted"><ins><em>Communist Party's &lt;a
     href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
     &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt; was found to contain 
&lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
@@ -505,65 +497,98 @@
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
+    Washington Post</em></ins></span> version of <span 
class="removed"><del><strong>Android has</strong></del></span> <span 
class="inserted"><ins><em>the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>universal back door&lt;/a&gt;. Nearly all
+models of mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes</em></ins></span> a <span 
class="removed"><del><strong>universal back door in</strong></del></span> <span 
class="inserted"><ins><em>clarification
+    saying that</em></ins></span> the <span class="removed"><del><strong>modem 
chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the Android version
+    of the app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this one is controlled
+by Coolpad.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple, 
&ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
+    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201908220"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Microsoft Windows</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908220"&gt;
     &lt;p&gt;ChromeBooks are programmed for obsolescence:
-    ChromeOS</em></ins></span> has a <span 
class="inserted"><ins><em>universal</em></ins></span> back door <span 
class="inserted"><ins><em>that is used</em></ins></span> for
-<span class="removed"><del><strong>&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
-it without understanding.
+    ChromeOS</em></ins></span> has a universal back door <span 
class="removed"><del><strong>through which</strong></del></span> <span 
class="inserted"><ins><em>that is used for updates and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
+    ceases to operate at a predefined date&lt;/a&gt;. From then on, there
+    appears to</em></ins></span> be <span class="removed"><del><strong>imposed 
on</strong></del></span> <span class="inserted"><ins><em>no support whatsoever 
for</em></ins></span> the <span class="removed"><del><strong>users&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;More information on when
+&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+this was used&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;In <span class="removed"><del><strong>Windows 
10,</strong></del></span> <span class="inserted"><ins><em>other words, when you 
stop getting screwed by</em></ins></span> the <span 
class="removed"><del><strong>universal back door is no longer hidden; all
+&ldquo;upgrades&rdquo; will
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
+and immediately imposed&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>updates</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
-    ceases to operate at a predefined date&lt;/a&gt;. From then on, there
-    appears to be no support whatsoever</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;
-
-    &lt;p&gt;In other words, when you stop getting screwed by the back door,
-    you start getting screwed by the obsolescence.&lt;/p&gt;
+&lt;p&gt;Windows 8's</strong></del></span> back <span 
class="removed"><del><strong>doors are so gaping that
+&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>door,
+    you start getting screwed by</em></ins></span> the <span 
class="removed"><del><strong>German government has decided it can't be 
trusted&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obsolescence.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>FordPass Connect feature of some Ford 
vehicles</em></ins></span> has <span class="removed"><del><strong>a back 
door</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+that allows Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for 
Apple</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>improved with</strong></del></span> <span 
class="inserted"><ins><em>you succeeded in breaking the
+    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>this power
+because</strong></del></span> <span class="inserted"><ins><em>you succeeded in 
breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;New GM cars &lt;a
+    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
+    offer the feature</em></ins></span> of <span 
class="removed"><del><strong>course we can trust Apple.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a universal 
back door&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Every nonfree program offers the user zero</em></ins></span> 
security <span class="removed"><del><strong>improvements&lt;/a&gt;; 
but</strong></del></span> <span class="inserted"><ins><em>against its
+    &lt;p&gt;Every nonfree program offers the user zero security against its
     developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;
+    worse.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711244"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>back door for
+&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span> <span 
class="inserted"><ins><em>product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
     listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -905,7 +930,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2017</strong></del></span> <span 
class="inserted"><ins><em>2014-2019</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2017</strong></del></span> <span 
class="inserted"><ins><em>2014-2020</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -916,7 +941,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/01/20 19:04:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/po/proprietary-back-doors.ja.po 31 Dec 2019 01:04:21 -0000      
1.110
+++ proprietary/po/proprietary-back-doors.ja.po 20 Jan 2020 19:04:01 -0000      
1.111
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -631,6 +631,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
 "surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
 "was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
@@ -1073,7 +1097,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary/po/proprietary-back-doors.pot   23 Nov 2019 15:30:43 -0000      
1.77
+++ proprietary/po/proprietary-back-doors.pot   20 Jan 2020 19:04:01 -0000      
1.78
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -467,6 +467,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a "
+"href=\"https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/\";>
 "
+"preinstalled adware and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a "
+"href=\"https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\";>
 "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's <a "
 "href=\"/proprietary/proprietary-surveillance.html#M201910130\"> &ldquo;Study "
 "the Great Nation&rdquo; app</a> was found to contain <a "
@@ -804,7 +827,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary/po/proprietary-back-doors.ru.po 23 Nov 2019 16:29:02 -0000      
1.198
+++ proprietary/po/proprietary-back-doors.ru.po 20 Jan 2020 19:04:01 -0000      
1.199
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
 "PO-Revision-Date: 2018-11-13 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -663,6 +664,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
 "surveillance.html#M201910130\"> &ldquo;Study the Great Nation&rdquo; app</a> "
 "was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-";
@@ -1169,7 +1194,10 @@
 
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+# | Copyright &copy; [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary/po/proprietary.de-diff.html     18 Dec 2019 23:01:25 -0000      
1.142
+++ proprietary/po/proprietary.de-diff.html     20 Jan 2020 19:04:01 -0000      
1.143
@@ -109,7 +109,7 @@
 <span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
 &lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>January, 
2020,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>450</em></ins></span>
 instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 500 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
@@ -154,9 +154,9 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -212,6 +212,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202001090"&gt;
+    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and a back door for forcing installation of
+    apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is in a modified version of an
+    essential system configuration app. The back door is a
+    surreptitious addition to a program whose stated purpose is to be a &lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is in addition to the
+    malware of Android itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912170"&gt;
     &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
     
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
@@ -303,26 +320,6 @@
     approval after compilation.  This amounts to a system of surveilling
     the use of free programs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The &lt;a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -374,7 +371,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -385,7 +382,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/18 23:01:25 $
+$Date: 2020/01/20 19:04:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary/po/proprietary.de.po    18 Dec 2019 23:01:26 -0000      1.183
+++ proprietary/po/proprietary.de.po    20 Jan 2020 19:04:01 -0000      1.184
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -98,8 +98,8 @@
 "übers Ohr gehauen zu werden&#160;…"
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
 # | [-functionalities,-] {+functionalities (with more than 500 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
@@ -108,7 +108,7 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -455,6 +455,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "
@@ -563,31 +587,6 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !
@@ -655,15 +654,15 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr "Copyright &copy; 2013-2018 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.247
retrieving revision 1.248
diff -u -b -r1.247 -r1.248
--- proprietary/po/proprietary.es.po    19 Dec 2019 11:23:37 -0000      1.247
+++ proprietary/po/proprietary.es.po    20 Jan 2020 19:04:01 -0000      1.248
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -88,8 +89,17 @@
 "de ser engañado."
 
 #. type: Content of: <div><p>
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -312,6 +322,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "
@@ -492,49 +526,6 @@
 "la aprobación de Apple tras la compilación. Esto supone un sistema de "
 "vigilancia de la utilización de programas libres."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-"La aplicación del Partido Comunista Chino <cite>Study the Great Nation</"
-"cite> requiere que los usuarios le permitan <a href=\"https://www.ndtv.com/";
-"world-news/chinese-app-allows-officials-access-to-100-million-users-phone-"
-"report-2115962\"> acceder al micrófono del teléfono, a las fotos, mensajes "
-"de texto, contactos e historial de navegación</a>, y en la versión para "
-"Android se ha descubierto una puerta trasera que permite a los "
-"desarrolladores ejecutar en el teléfono, como «supeusuarios», el código 
que "
-"deseen. Descargarse y utilizar esta aplicación es obligatorio en algunos "
-"centros de trabajo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-"Nota: La <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\">versión del artículo en el "
-"Washington Post</a> (en parte ocultada, pero legible si se copia y pega en "
-"un editor de texto) incluye una explicación en la que dice que las pruebas "
-"se han hecho únicamente en la versión de la aplicación para Android, y 
que, "
-"según Apple, «esta clase de vigilancia como \"superusuario\" no puede "
-"llevarse a cabo en el sistema operativo de Apple»."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -582,9 +573,15 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 "Foundation, Inc."
@@ -612,6 +609,49 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+#~ "requires users to grant it <a href=\"https://www.ndtv.com/world-news/";
+#~ "chinese-app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\"> access to the phone's microphone, photos, text "
+#~ "messages, contacts, and internet history</a>, and the Android version was "
+#~ "found to contain a back-door allowing developers to run any code they "
+#~ "wish in the users' phone, as &ldquo;superusers.&rdquo; Downloading and "
+#~ "using this app is mandatory at some workplaces."
+#~ msgstr ""
+#~ "La aplicación del Partido Comunista Chino <cite>Study the Great Nation</"
+#~ "cite> requiere que los usuarios le permitan <a href=\"https://www.ndtv.";
+#~ "com/world-news/chinese-app-allows-officials-access-to-100-million-users-"
+#~ "phone-report-2115962\"> acceder al micrófono del teléfono, a las fotos, "
+#~ "mensajes de texto, contactos e historial de navegación</a>, y en la "
+#~ "versión para Android se ha descubierto una puerta trasera que permite a "
+#~ "los desarrolladores ejecutar en el teléfono, como «supeusuarios», el "
+#~ "código que deseen. Descargarse y utilizar esta aplicación es obligatorio 
"
+#~ "en algunos centros de trabajo."
+
+#~ msgid ""
+#~ "Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> "
+#~ "Washington Post version of the article</a> (partly obfuscated, but "
+#~ "readable after copy-pasting in a text editor) includes a clarification "
+#~ "saying that the tests were only performed on the Android version of the "
+#~ "app, and that, according to Apple, &ldquo;this kind of &lsquo;"
+#~ "superuser&rsquo; surveillance could not be conducted on Apple's operating "
+#~ "system.&rdquo;"
+#~ msgstr ""
+#~ "Nota: La <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">versión 
"
+#~ "del artículo en el Washington Post</a> (en parte ocultada, pero legible "
+#~ "si se copia y pega en un editor de texto) incluye una explicación en la "
+#~ "que dice que las pruebas se han hecho únicamente en la versión de la "
+#~ "aplicación para Android, y que, según Apple, «esta clase de vigilancia "
+#~ "como \"superusuario\" no puede llevarse a cabo en el sistema operativo de "
+#~ "Apple»."
+
+#~ msgid ""
 #~ "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-";
 #~ "hong-kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the "
 #~ "Chinese government. When the region is set to Hong Kong, this flag is not "

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary/po/proprietary.fr.po    26 Dec 2019 20:17:01 -0000      1.295
+++ proprietary/po/proprietary.fr.po    20 Jan 2020 19:04:01 -0000      1.296
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2019-12-20 23:06+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -86,8 +87,17 @@
 "typiquement un moyen de mal se conduire."
 
 #. type: Content of: <div><p>
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -308,6 +318,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "
@@ -489,49 +523,6 @@
 "l'approbation d'Apple après compilation. Cela équivaut à un système de "
 "surveillance de l'utilisation des programmes libres."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-"L'appli du parti communiste chinois « Étudie la grande nation » oblige 
les "
-"utilisateurs à lui <a href=\"https://www.ndtv.com/world-news/chinese-app-";
-"allows-officials-access-to-100-million-users-phone-report-2115962\">donner "
-"accès au micro du téléphone, ainsi qu'aux photos, textos, carnets 
d'adresses "
-"et historique Internet</a> qui y sont stockés. De plus, la version Android "
-"s'est révélée contenir une porte dérobée permettant aux développeurs "
-"d'exécuter le code de leur choix sur le téléphone de l'utilisateur avec 
des "
-"privilèges de « super-utilisateur ». Le téléchargement et 
l'utilisation de "
-"cette appli sont obligatoires sur certains lieux de travail."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-"Note : la <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\">version de cet article publiée par "
-"le Washington Post</a> (partiellement cachée mais lisible après 
copié-collé "
-"dans un éditeur de texte) inclut une mise au point disant que les tests ont "
-"été faits uniquement sur la version Android de l'appli et que, d'après "
-"Apple, ce genre de surveillance avec privilèges de “super-utilisateur” 
ne "
-"pouvait pas fonctionner sur le système d'exploitation d'Apple »."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -578,9 +569,15 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr "Copyright &copy; 2013-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
@@ -604,3 +601,47 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+#~ "requires users to grant it <a href=\"https://www.ndtv.com/world-news/";
+#~ "chinese-app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\"> access to the phone's microphone, photos, text "
+#~ "messages, contacts, and internet history</a>, and the Android version was "
+#~ "found to contain a back-door allowing developers to run any code they "
+#~ "wish in the users' phone, as &ldquo;superusers.&rdquo; Downloading and "
+#~ "using this app is mandatory at some workplaces."
+#~ msgstr ""
+#~ "L'appli du parti communiste chinois « Étudie la grande nation » 
oblige "
+#~ "les utilisateurs à lui <a href=\"https://www.ndtv.com/world-news/chinese-";
+#~ "app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\">donner accès au micro du téléphone, ainsi qu'aux 
photos, "
+#~ "textos, carnets d'adresses et historique Internet</a> qui y sont stockés. 
"
+#~ "De plus, la version Android s'est révélée contenir une porte dérobée "
+#~ "permettant aux développeurs d'exécuter le code de leur choix sur le "
+#~ "téléphone de l'utilisateur avec des privilèges de « 
super-utilisateur ». "
+#~ "Le téléchargement et l'utilisation de cette appli sont obligatoires sur "
+#~ "certains lieux de travail."
+
+#~ msgid ""
+#~ "Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> "
+#~ "Washington Post version of the article</a> (partly obfuscated, but "
+#~ "readable after copy-pasting in a text editor) includes a clarification "
+#~ "saying that the tests were only performed on the Android version of the "
+#~ "app, and that, according to Apple, &ldquo;this kind of &lsquo;"
+#~ "superuser&rsquo; surveillance could not be conducted on Apple's operating "
+#~ "system.&rdquo;"
+#~ msgstr ""
+#~ "Note : la <a 
href=\"http://web-old.archive.org/web/20191015005153/https://";
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">version "
+#~ "de cet article publiée par le Washington Post</a> (partiellement cachée "
+#~ "mais lisible après copié-collé dans un éditeur de texte) inclut une 
mise "
+#~ "au point disant que les tests ont été faits uniquement sur la version "
+#~ "Android de l'appli et que, d'après Apple, ce genre de surveillance avec "
+#~ "privilèges de “super-utilisateur” ne pouvait pas fonctionner sur le "
+#~ "système d'exploitation d'Apple »."

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary/po/proprietary.it-diff.html     18 Dec 2019 23:01:26 -0000      
1.154
+++ proprietary/po/proprietary.it-diff.html     20 Jan 2020 19:04:01 -0000      
1.155
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,14 +58,14 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
-   text-decoration: none;
+   text-decoration: none;</em></ins></span>
 }
-#TOC a { text-decoration: none; }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
 #TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
@@ -109,7 +109,7 @@
 <span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
 &lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>January, 
2020,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>450</em></ins></span>
 instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 500 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
@@ -211,6 +211,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202001090"&gt;
+    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and a back door for forcing installation of
+    apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is in a modified version of an
+    essential system configuration app. The back door is a
+    surreptitious addition to a program whose stated purpose is to be a &lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is in addition to the
+    malware of Android itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912170"&gt;
     &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
     
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
@@ -302,26 +319,6 @@
     approval after compilation.  This amounts to a system of surveilling
     the use of free programs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The &lt;a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -373,7 +370,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -384,7 +381,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/18 23:01:26 $
+$Date: 2020/01/20 19:04:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary/po/proprietary.it.po    18 Dec 2019 23:01:26 -0000      1.192
+++ proprietary/po/proprietary.it.po    20 Jan 2020 19:04:01 -0000      1.193
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -94,8 +94,8 @@
 "norma. Il software proprietario moderno è tipicamente una fregatura."
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
 # | [-functionalities,-] {+functionalities (with more than 500 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
@@ -104,7 +104,7 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -459,6 +459,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "
@@ -567,31 +591,6 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -639,15 +638,15 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary/po/proprietary.ja-diff.html     31 Dec 2019 01:04:21 -0000      
1.158
+++ proprietary/po/proprietary.ja-diff.html     20 Jan 2020 19:04:01 -0000      
1.159
@@ -56,14 +56,14 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -106,7 +106,7 @@
 <span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
 &lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;As of <span class="removed"><del><strong>January, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>260</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
+&lt;p&gt;As of January, <span 
class="removed"><del><strong>2017,</strong></del></span> <span 
class="inserted"><ins><em>2020,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>260</strong></del></span> <span 
class="inserted"><ins><em>450</em></ins></span>
 instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 500 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
@@ -153,10 +153,10 @@
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -209,6 +209,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202001090"&gt;
+    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and a back door for forcing installation of
+    apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is in a modified version of an
+    essential system configuration app. The back door is a
+    surreptitious addition to a program whose stated purpose is to be a &lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is in addition to the
+    malware of Android itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912170"&gt;
     &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
     
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
@@ -300,26 +317,6 @@
     approval after compilation.  This amounts to a system of surveilling
     the use of free programs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The &lt;a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -371,7 +368,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -382,7 +379,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/01/20 19:04:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary/po/proprietary.ja.po    18 Dec 2019 23:01:26 -0000      1.176
+++ proprietary/po/proprietary.ja.po    20 Jan 2020 19:04:01 -0000      1.177
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -92,7 +92,7 @@
 #| "instances of malicious functionalities, but there are surely thousands "
 #| "more we don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -320,6 +320,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "
@@ -428,31 +452,6 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -500,8 +499,8 @@
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary/po/proprietary.nl-diff.html     18 Dec 2019 23:01:26 -0000      
1.155
+++ proprietary/po/proprietary.nl-diff.html     20 Jan 2020 19:04:01 -0000      
1.156
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,14 +58,14 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
-   text-decoration: none;
+   text-decoration: none;</em></ins></span>
 }
-#TOC a { text-decoration: none; }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
 #TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
@@ -109,7 +109,7 @@
 <span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
 &lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>January, 
2020,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>450</em></ins></span>
 instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 500 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
@@ -211,6 +211,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202001090"&gt;
+    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and a back door for forcing installation of
+    apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is in a modified version of an
+    essential system configuration app. The back door is a
+    surreptitious addition to a program whose stated purpose is to be a &lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is in addition to the
+    malware of Android itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912170"&gt;
     &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
     
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
@@ -302,26 +319,6 @@
     approval after compilation.  This amounts to a system of surveilling
     the use of free programs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The &lt;a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -373,7 +370,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -384,7 +381,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/18 23:01:26 $
+$Date: 2020/01/20 19:04:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary/po/proprietary.nl.po    18 Dec 2019 23:01:26 -0000      1.166
+++ proprietary/po/proprietary.nl.po    20 Jan 2020 19:04:01 -0000      1.167
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -96,17 +96,17 @@
 "je meestal belazerd."
 
 #. type: Content of: <div><p>
-# | As of [-April,-] {+October,+} 2019, the [-files-] {+pages+} in this
-# | directory list around 400 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 500 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2019,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around 4[-0-]{+5+}0 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2019, the files in this directory list around 400 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -363,6 +363,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "
@@ -471,31 +495,6 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -539,15 +538,15 @@
 "voor informatie over het onderhoud van vertalingen op deze website."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary/po/proprietary.pl-diff.html     18 Dec 2019 23:01:26 -0000      
1.172
+++ proprietary/po/proprietary.pl-diff.html     20 Jan 2020 19:04:01 -0000      
1.173
@@ -27,8 +27,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -56,14 +56,14 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -114,7 +114,7 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As of October, 2019, the pages in this directory list around 400
+&lt;p&gt;As of January, 2020, the pages in this directory list around 450
 instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 500 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
@@ -157,15 +157,15 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -209,6 +209,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202001090"&gt;
+    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and a back door for forcing installation of
+    apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is in a modified version of an
+    essential system configuration app. The back door is a
+    surreptitious addition to a program whose stated purpose is to be a &lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is in addition to the
+    malware of Android itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912170"&gt;
     &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
     
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
@@ -300,26 +317,6 @@
     approval after compilation.  This amounts to a system of surveilling
     the use of free programs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The &lt;a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -371,7 +368,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2014, <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020</em></ins></span> 
Free Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -382,7 +379,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/18 23:01:26 $
+$Date: 2020/01/20 19:04:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary/po/proprietary.pl.po    18 Dec 2019 23:01:26 -0000      1.159
+++ proprietary/po/proprietary.pl.po    20 Jan 2020 19:04:01 -0000      1.160
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -135,7 +135,7 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -540,6 +540,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "
@@ -648,31 +672,6 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -720,13 +719,13 @@
 "tłumaczeń</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary/po/proprietary.pot      18 Dec 2019 23:01:26 -0000      1.156
+++ proprietary/po/proprietary.pot      20 Jan 2020 19:04:01 -0000      1.157
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -70,7 +70,7 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -257,6 +257,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a "
+"href=\"https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/\";>
 "
+"preinstalled adware and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a "
+"href=\"https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\";>
 "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a "
 
"href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;hackers&rdquo;</a>)
  "
 "managed to interfere the Amazon Ring proprietary system, and <a "
@@ -368,29 +391,6 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a "
-"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\";>
 "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a "
-"back-door allowing developers to run any code they wish in the users' phone, "
-"as &ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a "
-"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\";>
 "
-"Washington Post version of the article</a> (partly obfuscated, but readable "
-"after copy-pasting in a text editor) includes a clarification saying that "
-"the tests were only performed on the Android version of the app, and that, "
-"according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance "
-"could not be conducted on Apple's operating system.&rdquo;"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -428,8 +428,8 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary/po/proprietary.pt-br.po 20 Dec 2019 14:59:21 -0000      1.261
+++ proprietary/po/proprietary.pt-br.po 20 Jan 2020 19:04:01 -0000      1.262
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2019-12-20 11:27-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -84,8 +85,13 @@
 "de ser mal."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -305,6 +311,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "
@@ -482,48 +512,6 @@
 "aprovação da Apple após a compilação. Isso equivale a um sistema de "
 "monitoramento do uso de programas livres."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-"O aplicativo “Study the Great Nation” do Partido Comunista Chinês exige 
que "
-"os usuários o concedam <a 
href=\"https://www.ndtv.com/world-news/chinese-app-";
-"allows-officials-access-to-100-million-users-phone-report-2115962\"> acesso "
-"ao microfone, fotos, mensagens de texto, contatos e histórico da Internet do 
"
-"telefone</a>, e a versão Android contém uma <i lang=\"en\">back door</i> 
que "
-"permite que os desenvolvedores executem qualquer código que desejarem desejo 
"
-"no telefone dos usuários, como “superusuários”. Baixar e usar este "
-"aplicativo é obrigatório em alguns locais de trabalho."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-"Nota: A <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> versão de artigo do Washington "
-"Post</a> (parcialmente ofuscada, mas legível após copiar e colar em um "
-"editor de texto) inclui um esclarecimento dizendo que os testes foram "
-"realizados apenas na versão Android do aplicativo e que, segundo a Apple, "
-"“esse tipo de vigilância de ‘superusuário’ não pôde ser realizado 
em Sistema "
-"operacional da Apple”."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -569,9 +557,13 @@
 "envio de traduções das páginas desse site."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 "Foundation, Inc."
@@ -599,6 +591,48 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+#~ "requires users to grant it <a href=\"https://www.ndtv.com/world-news/";
+#~ "chinese-app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\"> access to the phone's microphone, photos, text "
+#~ "messages, contacts, and internet history</a>, and the Android version was "
+#~ "found to contain a back-door allowing developers to run any code they "
+#~ "wish in the users' phone, as &ldquo;superusers.&rdquo; Downloading and "
+#~ "using this app is mandatory at some workplaces."
+#~ msgstr ""
+#~ "O aplicativo “Study the Great Nation” do Partido Comunista Chinês 
exige "
+#~ "que os usuários o concedam <a href=\"https://www.ndtv.com/world-news/";
+#~ "chinese-app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\"> acesso ao microfone, fotos, mensagens de texto, "
+#~ "contatos e histórico da Internet do telefone</a>, e a versão Android "
+#~ "contém uma <i lang=\"en\">back door</i> que permite que os "
+#~ "desenvolvedores executem qualquer código que desejarem desejo no telefone 
"
+#~ "dos usuários, como “superusuários”. Baixar e usar este aplicativo é 
"
+#~ "obrigatório em alguns locais de trabalho."
+
+#~ msgid ""
+#~ "Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> "
+#~ "Washington Post version of the article</a> (partly obfuscated, but "
+#~ "readable after copy-pasting in a text editor) includes a clarification "
+#~ "saying that the tests were only performed on the Android version of the "
+#~ "app, and that, according to Apple, &ldquo;this kind of &lsquo;"
+#~ "superuser&rsquo; surveillance could not be conducted on Apple's operating "
+#~ "system.&rdquo;"
+#~ msgstr ""
+#~ "Nota: A <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> versão 
"
+#~ "de artigo do Washington Post</a> (parcialmente ofuscada, mas legível 
após "
+#~ "copiar e colar em um editor de texto) inclui um esclarecimento dizendo "
+#~ "que os testes foram realizados apenas na versão Android do aplicativo e "
+#~ "que, segundo a Apple, “esse tipo de vigilância de ‘superusuário’ 
não pôde "
+#~ "ser realizado em Sistema operacional da Apple”."
+
+#~ msgid ""
 #~ "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-";
 #~ "hong-kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the "
 #~ "Chinese government. When the region is set to Hong Kong, this flag is not "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- proprietary/po/proprietary.ru.po    19 Dec 2019 06:59:30 -0000      1.328
+++ proprietary/po/proprietary.ru.po    20 Jan 2020 19:04:01 -0000      1.329
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -88,8 +89,17 @@
 "способ дать себя одурачить."
 
 #. type: Content of: <div><p>
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -311,6 +321,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "
@@ -488,49 +522,6 @@
 "одобрение Apple после компиляции. Это 
выльется в систему надзора за "
 "пользованием свободными программами."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-"Приложение Китайской коммунистической 
партии &ldquo;Изучай великую "
-"нацию&rdquo; требует, чтобы пользователи 
предоставляли ему <a href=\"https://";
-"www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-"
-"users-phone-report-2115962\"> в телефоне доступ к 
микрофону, фотографиям, "
-"текстовым сообщениям, адресной книге, а 
также истории сетевых "
-"взаимодействий</a>, а в версии под Android 
обнаружилась лазейка, позволяющая "
-"разработчикам выполнять какие угодно 
команды в телефоне пользователя, с "
-"привилегиями &ldquo;сверхпользователей&rdquo;. 
В некоторых учреждениях "
-"установка и пользование этим приложением 
обязательно."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-"Замечание: <a 
href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> в редакции этой 
статьи из &ldquo;"
-"Вашингтон пост&rdquo;</a> (чтение напрямую 
затруднено, но возможно после "
-"копирования и вставки в текстовом 
редакторе) присутствует разъяснение, где "
-"сказано, что тесты проводились только на 
версии приложения под Android и "
-"что, согласно Apple, &ldquo;этого рода &lsquo;сверх
пользовательская&rsquo; "
-"слежка не могла бы быть введена на 
операционной системе Apple&rdquo;."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -576,9 +567,15 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 "Foundation, Inc."
@@ -609,6 +606,50 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
+#~ "requires users to grant it <a href=\"https://www.ndtv.com/world-news/";
+#~ "chinese-app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\"> access to the phone's microphone, photos, text "
+#~ "messages, contacts, and internet history</a>, and the Android version was "
+#~ "found to contain a back-door allowing developers to run any code they "
+#~ "wish in the users' phone, as &ldquo;superusers.&rdquo; Downloading and "
+#~ "using this app is mandatory at some workplaces."
+#~ msgstr ""
+#~ "Приложение Китайской коммунистической 
партии &ldquo;Изучай великую "
+#~ "нацию&rdquo; требует, чтобы пользователи 
предоставляли ему <a href="
+#~ "\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-";
+#~ "to-100-million-users-phone-report-2115962\"> в телефоне 
доступ к "
+#~ "микрофону, фотографиям, текстовым 
сообщениям, адресной книге, а также "
+#~ "истории сетевых взаимодействий</a>, а в 
версии под Android обнаружилась "
+#~ "лазейка, позволяющая разработчикам 
выполнять какие угодно команды в "
+#~ "телефоне пользователя, с привилегиями 
&ldquo;сверхпользователей&rdquo;. В "
+#~ "некоторых учреждениях установка и 
пользование этим приложением "
+#~ "обязательно."
+
+#~ msgid ""
+#~ "Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> "
+#~ "Washington Post version of the article</a> (partly obfuscated, but "
+#~ "readable after copy-pasting in a text editor) includes a clarification "
+#~ "saying that the tests were only performed on the Android version of the "
+#~ "app, and that, according to Apple, &ldquo;this kind of &lsquo;"
+#~ "superuser&rsquo; surveillance could not be conducted on Apple's operating "
+#~ "system.&rdquo;"
+#~ msgstr ""
+#~ "Замечание: <a 
href=\"http://web-old.archive.org/web/20191015005153/";
+#~ "https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-";
+#~ "ideology-allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> в "
+#~ "редакции этой статьи из &ldquo;Вашингтон 
пост&rdquo;</a> (чтение напрямую "
+#~ "затруднено, но возможно после 
копирования и вставки в текстовом "
+#~ "редакторе) присутствует разъяснение, 
где сказано, что тесты проводились "
+#~ "только на версии приложения под Android и 
что, согласно Apple, &ldquo;"
+#~ "этого рода &lsquo;сверх
пользовательская&rsquo; слежка не могла бы 
быть "
+#~ "введена на операционной системе Apple&rdquo;."
+
+#~ msgid ""
 #~ "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-";
 #~ "hong-kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the "
 #~ "Chinese government. When the region is set to Hong Kong, this flag is not "

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary/po/proprietary.zh-tw-diff.html  18 Dec 2019 23:01:26 -0000      
1.134
+++ proprietary/po/proprietary.zh-tw-diff.html  20 Jan 2020 19:04:01 -0000      
1.135
@@ -109,7 +109,7 @@
 <span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
 &lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2019,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>400</em></ins></span>
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>January, 
2020,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>450</em></ins></span>
 instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 500 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
@@ -154,9 +154,9 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -212,6 +212,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202001090"&gt;
+    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and a back door for forcing installation of
+    apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The adware is in a modified version of an
+    essential system configuration app. The back door is a
+    surreptitious addition to a program whose stated purpose is to be a &lt;a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is in addition to the
+    malware of Android itself.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912170"&gt;
     &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
     
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
@@ -303,26 +320,6 @@
     approval after compilation.  This amounts to a system of surveilling
     the use of free programs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The &lt;a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -374,7 +371,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -385,7 +382,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/18 23:01:26 $
+$Date: 2020/01/20 19:04:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary/po/proprietary.zh-tw.po 18 Dec 2019 23:01:26 -0000      1.144
+++ proprietary/po/proprietary.zh-tw.po 20 Jan 2020 19:04:01 -0000      1.145
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -89,8 +89,8 @@
 "方式為專有軟體。"
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
 # | [-functionalities,-] {+functionalities (with more than 500 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
@@ -99,7 +99,7 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -433,6 +433,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "
@@ -541,31 +565,6 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://";
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, &ldquo;this "
-"kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
-"Apple's operating system.&rdquo;"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -608,15 +607,15 @@
 "宜。"
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- proprietary/po/pt-br.po     27 Dec 2019 10:34:04 -0000      1.214
+++ proprietary/po/pt-br.po     20 Jan 2020 19:04:01 -0000      1.215
@@ -5239,6 +5239,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -6495,6 +6519,18 @@
 "such as Carrier IQ</a>."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -7352,7 +7388,7 @@
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."
@@ -8164,16 +8200,16 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""
-#| "As of April, 2019, the pages in this directory list around 400 instances "
-#| "of malicious functionalities (with more than 450 references to back them "
-#| "up), but there are surely thousands more we don't know about."
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
-"Até abril de 2019, as páginas neste diretório listam quase 400 exemplos de 
"
-"funcionalidades maliciosas (com mais de 450 referências para confirmá-las), 
"
+"Até outubro de 2019, as páginas neste diretório listam quase 400 exemplos 
de "
+"funcionalidades maliciosas (com mais de 500 referências para confirmá-las), 
"
 "mas com certeza há mais milhares das quais nós não temos conhecimento."
 
 #. type: Content of: <div><table><tr><th>
@@ -8396,13 +8432,13 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 "Foundation, Inc."
 
 #. type: Content of: <title>
@@ -9674,6 +9710,32 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft</a>"
 
 #, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the pages in this directory list around 400 instances "
+#~| "of malicious functionalities (with more than 450 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Até abril de 2019, as páginas neste diretório listam quase 400 exemplos 
"
+#~ "de funcionalidades maliciosas (com mais de 450 referências para 
confirmá-"
+#~ "las), mas com certeza há mais milhares das quais nós não temos "
+#~ "conhecimento."
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
 #~| msgid "<a href=\"/proprietary/potential-malware.html\">In the pipe</a>"
 #~ msgid ""
 #~ "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.362
retrieving revision 1.363
diff -u -b -r1.362 -r1.363
--- proprietary/po/ru.po        27 Dec 2019 11:31:23 -0000      1.362
+++ proprietary/po/ru.po        20 Jan 2020 19:04:01 -0000      1.363
@@ -6419,6 +6419,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -8029,6 +8053,21 @@
 "features/logs-and-services/loggers/carrieriq/\"> скрытый пакет 
слежки, такой "
 "как Carrier IQ</a>."
 
+# type: Content of: <div><p>
+#. type: Content of: <div><p>
+# | Copyright &copy; 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Malware in Webpages - GNU Project - Free Software Foundation"
 msgstr ""
@@ -8971,8 +9010,12 @@
 "deeplinks/2015/02/who-really-owns-your-drones\">примеры 
применения лазеек</"
 "a>."
 
+# type: Content of: <div><p>
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+# | Copyright &copy; [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -9935,8 +9978,17 @@
 "способ дать себя одурачить."
 
 #. type: Content of: <div><p>
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -10157,9 +10209,15 @@
 msgstr "Последние добавления"
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 "Foundation, Inc."
@@ -11548,6 +11606,25 @@
 msgstr ""
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
 
+#~ msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "На октябрь 2019&nbsp;года на страницах этого 
каталога перечислено около "
+#~ "400 примеров вредоносных функций (и более 
500 ссылок, подкрепляющих их), "
+#~ "но есть, бесспорно, тысячи других, о 
которых мы не знаем."
+
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+
 #~ msgid ""
 #~ "One kind of malicious functionality mediates developer's interference "
 #~ "into the use of the software. This page describes how various proprietary "

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/po/zh-tw.po     27 Dec 2019 10:34:04 -0000      1.165
+++ proprietary/po/zh-tw.po     20 Jan 2020 19:04:02 -0000      1.166
@@ -4571,6 +4571,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://";
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-";
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -5619,6 +5643,20 @@
 "such as Carrier IQ</a>."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013,-] 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Malware in Webpages+} - GNU Project - Free
 # | Software Foundation
@@ -6329,13 +6367,13 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2014-2019+} Free
+# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2014-2020+} Free
 # | Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
-msgid "Copyright &copy; 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2020 Free Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."
@@ -7152,8 +7190,8 @@
 "方式為專有軟體。"
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
 # | [-functionalities,-] {+functionalities (with more than 500 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
@@ -7162,7 +7200,7 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
 "of malicious functionalities (with more than 500 references to back them "
 "up), but there are surely thousands more we don't know about."
 msgstr ""
@@ -7495,15 +7533,15 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."
@@ -8835,6 +8873,30 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "到2017年4月為止,此目錄列出的檔案已整理出約 300 
種惡意功能的實例,但是絕對"
+#~ "還有上千種我們不瞭解的利用方式。"
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "<a href=\"/proprietary/proprietary-drm.html\">Digital restrictions "
 #~| "management</a> or &ldquo;DRM&rdquo; means functionalities designed to "
 #~| "restrict what users can do with the data in their computers."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]