www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Mon, 24 Feb 2020 12:03:39 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/02/24 12:03:38

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.es.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po nl.po pl.po pot 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.496&r2=1.497
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.335&r2=1.336
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.317&r2=1.318
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.589&r2=1.590
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.255&r2=1.256
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.336&r2=1.337
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.381&r2=1.382
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.173&r2=1.174

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- de.po       21 Feb 2020 23:32:16 -0000      1.173
+++ de.po       24 Feb 2020 17:03:36 -0000      1.174
@@ -2570,6 +2570,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -4457,12 +4474,13 @@
 "sind Tyrannen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019+} Free Software
+# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free Software
 # | Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016, 2017, 2018 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2018 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -5584,15 +5602,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free Software
-# | Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2018 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -11426,16 +11435,16 @@
 "niemals vertrauen kann."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
-msgstr "Copyright &copy; <ins>2013-</ins>2018 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2015-2018 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Proprietary Interference - GNU Project - Free Software Foundation"
@@ -12385,18 +12394,6 @@
 "computerworld.com 2013.\">bestand Oracle darauf, diese Praxis fortzusetzen</"
 "a>."
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
-#| "Inc."
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2015-2018 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
 msgstr "Proprietäre Abonnements - GNU-Projekt - Free Software Foundation"
@@ -12455,6 +12452,14 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2016, 2017, 2018 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016, 2017, 2018 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr "Proprietäre Überwachung - GNU-Projekt - Free Software Foundation"
@@ -13942,6 +13947,16 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; <ins>2013-</ins>2018 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "<a href=\"http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-";
 #~| "bootloader.html\"> Some Android phones made by Google are tyrants</a> "
 #~| "(though someone found a way to crack the restriction).  Fortunately, "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- es.po       21 Feb 2020 23:32:16 -0000      1.245
+++ es.po       24 Feb 2020 17:03:36 -0000      1.246
@@ -2442,6 +2442,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -3989,13 +4006,14 @@
 "Achievements\">son tiranos</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015,-] 2016, 2017, [-2018-] {+2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+#| "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 # | Malware [-in Mobile Devices-] {+In Cars+} - GNU Project - Free Software
@@ -5261,16 +5279,6 @@
 "buena parte de los datos personales</a>, incluso muchas actividades que no "
 "tienen nada que ver con las trampas."
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
-# | Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Amazon's-]{+Google's+} Software Is Malware - GNU Project - Free Software
 # | Foundation
@@ -11246,17 +11254,18 @@
 "en el software privativo."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
+# | Copyright &copy; 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
 # | Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
-#| "Inc."
+#| "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
 
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Interference+} - GNU Project - Free Software
@@ -12105,20 +12114,6 @@
 "continue-to-bundle--crapware--with-java.html\">Oracle insistió en continuar "
 "con esta práctica</a>."
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-
 #. type: Content of: <title>
 # | Proprietary [-Tyrants-] {+Subscriptions+} - GNU Project - Free Software
 # | Foundation
@@ -12188,6 +12183,15 @@
 "Aquí se presentan ejemplos de suscripciones de software que causan un daño "
 "directo a los usuarios."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2015,-] 2016, 2017, [-2018-] {+2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Tyrants-] {+Surveillance+} - GNU Project - Free Software
 # | Foundation
@@ -13668,6 +13672,17 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#~ "Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "Google tracks the movements of Android phones, and sometimes <a href="
 #~| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
 #~| "tracking-police.html\"> saves the data for years</a>."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- fr.po       24 Feb 2020 13:52:39 -0000      1.302
+++ fr.po       24 Feb 2020 17:03:36 -0000      1.303
@@ -2125,6 +2125,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -3589,8 +3606,9 @@
 "des tyrans</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -4676,11 +4694,6 @@
 "grand nombre correspondent à des activités n'ayant rien à voir avec la "
 "triche."
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -9857,9 +9870,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2015-2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2015-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Proprietary Interference - GNU Project - Free Software Foundation"
@@ -10569,12 +10582,6 @@
 "continue-to-bundle--crapware--with-java.html\">Oracle a perpétué cette "
 "pratique</a>."
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2015-2020 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
 msgstr "Abonnements privateurs - Projet GNU - Free Software Foundation"
@@ -10615,6 +10622,10 @@
 "Vous trouverez ci-dessous des exemples d'abonnements à des logiciels qui ont 
"
 "fait du tort directement aux utilisateurs."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr "Surveillants privateurs - GNU Project - Free Software Foundation"
@@ -11798,3 +11809,8 @@
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
 msgstr ""
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013, 2015-2019 Free Software Foundation, Inc."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- it.po       21 Feb 2020 23:32:16 -0000      1.173
+++ it.po       24 Feb 2020 17:03:36 -0000      1.174
@@ -2512,6 +2512,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -4206,12 +4223,13 @@
 "\">sono tiranni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -5270,16 +5288,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Amazon's-]{+Google's+} Software Is Malware - GNU Project - Free Software
 # | Foundation
@@ -10733,15 +10741,17 @@
 "si possa fidare della sicurezza del software non libero."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 # | Proprietary [-Surveillance-] {+Interference+} - GNU Project - Free
@@ -11661,19 +11671,6 @@
 "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
 "\">ha continuato a perpetrare questa pratica.</a>"
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
-#| "Inc."
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | Proprietary [-Insecurity-] {+Subscriptions+} - GNU Project - Free Software
 # | Foundation
@@ -11721,6 +11718,15 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr "Sorveglianza proprietaria - Progetto GNU - Free Software Foundation"
@@ -13218,6 +13224,15 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "<a href=\"http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-";
 #~| "bootloader.html\"> Some Android phones are tyrants</a> (though someone "
 #~| "found a way to crack the restriction).  Fortunately, most Android "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- ja.po       21 Feb 2020 23:32:16 -0000      1.181
+++ ja.po       24 Feb 2020 17:03:36 -0000      1.182
@@ -1917,6 +1917,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -3153,7 +3170,8 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -4035,13 +4053,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 #, fuzzy
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -8319,7 +8330,7 @@
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 
@@ -9029,15 +9040,6 @@
 "continue-to-bundle--crapware--with-java.html\">オラクルはこのæ…
£ç¿’を続けること"
 "を主張しています。</a>"
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
 msgstr ""
@@ -9089,6 +9091,12 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr ""
@@ -10315,6 +10323,15 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "<a href=\"http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-";
 #~| "bootloader.html\"> Some Android phones are tyrants</a> (though someone "
 #~| "found a way to crack the restriction).  Fortunately, most Android "

Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- malware-appliances.de-diff.html     18 Dec 2019 23:01:25 -0000      1.51
+++ malware-appliances.de-diff.html     24 Feb 2020 17:03:36 -0000      1.52
@@ -101,19 +101,34 @@
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
-      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>Amazon Ring proprietary system, and</em></ins></span> 
&lt;a
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, 
if</strong></del></span> <span class="inserted"><ins><em>Amazon Ring 
proprietary system, and &lt;a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access</em></ins></span>
+    its <span class="removed"><del><strong>manufacturer can communicate with 
it,
+      is</strong></del></span> <span class="inserted"><ins><em>camera, 
speakers and microphones&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had</em></ins></span>
+    a <span class="removed"><del><strong>surveillance 
device.</strong></del></span> <span class="inserted"><ins><em>security 
vulnerability that enabled attackers to</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
-    its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;
+       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based</strong></del></span> <span 
class="inserted"><ins><em>user's wifi password&lt;/a&gt;, and 
snoop</em></ins></span> on the <span class="removed"><del><strong>fact
+      that</strong></del></span> <span class="inserted"><ins><em>household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of</em></ins></span> the <span 
class="removed"><del><strong>device is tethered</strong></del></span> <span 
class="inserted"><ins><em>wifi password would not be 
sufficient</em></ins></span> to <span class="removed"><del><strong>a 
server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More 
about</strong></del></span> <span class="inserted"><ins><em>carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with</em></ins></span> 
proprietary <span class="removed"><del><strong>tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But it</strong></del></span>
+    <span class="inserted"><ins><em>software lack this. Of course, they 
are</em></ins></span> also <span class="removed"><del><strong>demonstrates 
that</strong></del></span> <span class="inserted"><ins><em>used by their
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201904260"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>article describes 
wrongdoing by the manufacturer, based on the fact
-      that the device is</strong></del></span> <span 
class="inserted"><ins><em>Jibo robot toys were</em></ins></span> tethered to 
<span class="removed"><del><strong>a server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates that</strong></del></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>manufacturer's server,
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>manufacturer's server,
     and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;</em></ins></span>
     the company
       <span class="removed"><del><strong>surveillance capability.&lt;/p&gt;
@@ -124,187 +139,193 @@
     hospitals is connected</strong></del></span> <span 
class="inserted"><ins><em>made them all cease</em></ins></span> to <span 
class="removed"><del><strong>the internet. Naturally &lt;a
 
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt; by shutting down</em></ins></span> 
that <span class="removed"><del><strong>this article misuses the term &lt;a
-href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-     referring to crackers.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;</strong></del></span>
-    <span class="inserted"><ins><em>server.&lt;/p&gt;</em></ins></span>
+  &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt; by shutting down</em></ins></span> 
that <span class="removed"><del><strong>this article 
misuses</strong></del></span>
+    <span class="inserted"><ins><em>server.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>bad security in many 
Internet of Stings devices
-    allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on</strong></del></span> <span class="inserted"><ins><em>shutdown 
might ironically be good for their users, since</em></ins></span> the
-    <span class="inserted"><ins><em>product was designed to 
manipulate</em></ins></span> people <span class="removed"><del><strong>that use 
them&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Don't be</strong></del></span> <span class="inserted"><ins><em>by 
presenting</em></ins></span> a <span 
class="removed"><del><strong>sucker&mdash;reject all the stings.&lt;/p&gt;
-  &lt;p&gt;It is unfortunate that the article uses the
-  term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Many models</strong></del></span> <span 
class="inserted"><ins><em>phony
-    semblance</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras are tremendously 
insecure.
-  They have login accounts with hard-coded passwords, which can't be
-  changed,</strong></del></span> <span 
class="inserted"><ins><em>emotions,</em></ins></span> and <span 
class="removed"><del><strong>&lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way to
-  delete these accounts either&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>was most certainly spying on 
them.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The shutdown might ironically be good for their users, 
since</em></ins></span> the <span class="removed"><del><strong>term &lt;a
+href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
+     referring</strong></del></span>
+    <span class="inserted"><ins><em>product was designed</em></ins></span> to 
<span class="removed"><del><strong>crackers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on 
them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>proprietary code that runs 
pacemakers, insulin pumps, and other
-medical devices is</strong></del></span> <span 
class="inserted"><ins><em>Medtronics Conexus Telemetry Protocol 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models</em></ins></span> of <span 
class="removed"><del><strong>gross security faults&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;Users are suing Bose for &lt;a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing a spyware app for its headphones&lt;/a&gt;.
-Specifically, the app would record</strong></del></span> <span 
class="inserted"><ins><em>implantable
-    defibrillators&lt;/a&gt; and</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>devices they connect to.&lt;/p&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>bad security in many 
Internet</strong></del></span> <span class="inserted"><ins><em>Medtronics 
Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models</em></ins></span> of <span 
class="removed"><del><strong>Stings</strong></del></span> <span 
class="inserted"><ins><em>implantable
+    defibrillators&lt;/a&gt; and the</em></ins></span> devices
+    <span class="removed"><del><strong>allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
 <span class="inserted"><ins><em>they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
     vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by</em></ins></span> the 
<span class="removed"><del><strong>audio files
-users listen</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>correct them. This means you can't rely on 
proprietary software
+    protocol in 2008. Apparently, nothing was done by the 
company</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span>
+    <span class="inserted"><ins><em>correct them. This means you can't 
rely</em></ins></span> on <span class="removed"><del><strong>the people that 
use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+  &lt;p&gt;It</strong></del></span> <span 
class="inserted"><ins><em>proprietary software
     developers to fix bugs in their products.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902270"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>suit 
accuses</strong></del></span> <span class="inserted"><ins><em>Ring (now Amazon) 
doorbell camera is designed so</em></ins></span> that <span 
class="removed"><del><strong>this was done without the users' consent.
-If</strong></del></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch 
all</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>time. 
Now</em></ins></span> it <span class="removed"><del><strong>acceptable? No way! 
It should be flat</strong></del></span> <span 
class="inserted"><ins><em>turns</em></ins></span> out
-    <span class="inserted"><ins><em>that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span>
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera</em></ins></span> is <span 
class="removed"><del><strong>unfortunate</strong></del></span> <span 
class="inserted"><ins><em>designed so</em></ins></span> that the <span 
class="removed"><del><strong>article uses</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch 
all</em></ins></span> the
+  <span class="removed"><del><strong>term</strong></del></span> <span 
class="inserted"><ins><em>time. Now it turns out
+    that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Many models of Internet-connected cameras are tremendously insecure.
+  They have login accounts with hard-coded passwords, which can't be
+  changed,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
-    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+    anyone else can also watch,</em></ins></span> and <span 
class="removed"><del><strong>&lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there</strong></del></span>
 <span class="inserted"><ins><em>fake videos too&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The third party vulnerability is presumably
+    &lt;p&gt;The third party vulnerability</em></ins></span> is <span 
class="removed"><del><strong>no way</strong></del></span> <span 
class="inserted"><ins><em>presumably
     unintentional and Amazon will probably fix it. However, we
-    do not expect Amazon</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>change</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>design that &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
-    Amazon</em></ins></span> to <span class="removed"><del><strong>snoop at 
all&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  &lt;li <span class="removed"><del><strong>id="anova"&gt;
-  &lt;p&gt;Anova sabotaged users' cooking devices with a 
downgrade</strong></del></span> <span 
class="inserted"><ins><em>id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that
-  <span class="removed"><del><strong>tethered them to a remote server. &lt;a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
-  cookers won't function.&lt;/a&gt;&lt;/p&gt;
+    do not expect Amazon</em></ins></span> to
+  <span class="removed"><del><strong>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
 <span class="inserted"><ins><em>constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="inserted"><ins><em>make sure</em></ins></span> the <span 
class="removed"><del><strong>Internet,
-its security</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;For example, a cracker can gain access to</strong></del></span> <span 
class="inserted"><ins><em>still
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>dishwasher's filesystem,
- infect it with malware,</strong></del></span> <span 
class="inserted"><ins><em>subscription,</em></ins></span> and <span 
class="removed"><del><strong>force</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+&lt;p&gt;The proprietary code</strong></del></span> <span 
class="inserted"><ins><em>change the design</em></ins></span> that <span 
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
+medical devices is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing Bose 
for</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing a spyware app</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying</em></ins></span> for <span class="removed"><del><strong>its 
headphones&lt;/a&gt;.
+Specifically,</strong></del></span> the <span class="removed"><del><strong>app 
would record</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>dishwasher to launch attacks</strong></del></span> 
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases, it spies</em></ins></span> on
- <span class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
-    restrictions</em></ins></span> in the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
- such attacks could potentially put hundreds</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> of <span 
class="removed"><del><strong>lives at risk.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use</em></ins></span> of <span 
class="inserted"><ins><em>ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
-etc.,
-usually</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
-previous owners can still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send</em></ins></span> the <span class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="removed"><del><strong>along 
with</strong></del></span> <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by, the user's front door.&lt;/p&gt;
+    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses</strong></del></span> <span 
class="inserted"><ins><em>video shows everyone</em></ins></span> that <span 
class="removed"><del><strong>this was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span class="removed"><del><strong>fine 
print of</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at the videos freely.  It appears Amazon has tried to prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
+    at</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
+would that make it acceptable? No way!</strong></del></span> <span 
class="inserted"><ins><em>videos freely.</em></ins></span>  It <span 
class="removed"><del><strong>should be flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span> <span class="inserted"><ins><em>appears Amazon 
has tried</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>prevent that
+    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>surrender 
to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;</em></ins></span>
-    &lt;p&gt;Vizio
-    <span 
class="removed"><del><strong>&ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-      report everything that is viewed on them,</strong></del></span>
+  &lt;li <span class="removed"><del><strong>id="anova"&gt;
+  &lt;p&gt;Anova sabotaged users' cooking devices with a downgrade that
+  tethered them to a remote server.</strong></del></span> <span 
class="inserted"><ins><em>id="M201901070"&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
+  cookers won't function.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;When Miele's Internet</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO,</em></ins></span> and <span class="removed"><del><strong>not just 
broadcasts</strong></del></span> <span class="inserted"><ins><em>this data is 
sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>cable&lt;/a&gt;. 
Even if</strong></del></span> <span class="inserted"><ins><em>slightly
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own 
words</em></ins></span> of <span class="removed"><del><strong>Stings hospital 
disinfectant dishwasher is
+&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> the <span class="removed"><del><strong>Internet,
+its security</strong></del></span> <span class="inserted"><ins><em>company's
+    CTO, and this data</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;For example, a cracker can gain access</strong></del></span> <span 
class="inserted"><ins><em>sold</em></ins></span> to <span 
class="removed"><del><strong>the dishwasher's filesystem,
+ infect it with malware,</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>force the 
dishwasher</strong></del></span> <span class="inserted"><ins><em>slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>Vizio software</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span>
-    <span class="inserted"><ins><em>nonfree, we don't know what is actually 
happening behind</em></ins></span> the <span 
class="removed"><del><strong>user's own
-    computer,</strong></del></span> <span class="inserted"><ins><em>scenes,
-    and there is no guarantee that all future updates will 
leave</em></ins></span> the <span class="removed"><del><strong>TV reports what 
it is. The existence of</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own</em></ins></span> a <span 
class="inserted"><ins><em>Vizio smart TV (or any smart TV, for that
-    matter), the easiest</em></ins></span> way to
-    <span class="removed"><del><strong>disable the surveillance, even 
if</strong></del></span> <span class="inserted"><ins><em>make 
sure</em></ins></span> it <span class="removed"><del><strong>were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>isn't spying on you is
-    to disconnect</em></ins></span> it <span class="removed"><del><strong>was 
in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on
+ other devices</strong></del></span> <span class="inserted"><ins><em>make this 
spying acceptable, according to him,
+    is that it is opt-in</em></ins></span> in <span 
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
+ such attacks could potentially put hundreds of lives at risk.&lt;/p&gt;
+
+&lt;/li&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>Vizio 
software is
+    nonfree, we don't know what is actually happening behind the scenes,
+    and there is no guarantee that all future updates will leave the
+    settings unchanged.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;If you <span 
class="removed"><del><strong>buy</strong></del></span> <span 
class="inserted"><ins><em>already own</em></ins></span> a <span 
class="removed"><del><strong>used &ldquo;smart&rdquo; car, 
house,</strong></del></span> <span class="inserted"><ins><em>Vizio smart TV (or 
any smart</em></ins></span> TV, <span class="removed"><del><strong>refrigerator,
+etc.,
+usually &lt;a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
+previous owners can still remotely control it&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 &lt;li&gt;
-&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+      report everything</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> that <span 
class="removed"><del><strong>is viewed</strong></del></span>
+    <span class="inserted"><ins><em>matter), the easiest way to make sure it 
isn't spying</em></ins></span> on <span 
class="removed"><del><strong>them,</strong></del></span> <span 
class="inserted"><ins><em>you is
+    to disconnect it from the Internet,</em></ins></span> and <span 
class="inserted"><ins><em>use a terrestrial antenna
+    instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>just broadcasts
+      and cable&lt;/a&gt;. Even</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,</em></ins></span>
+    if <span class="removed"><del><strong>the image</strong></del></span> 
<span class="inserted"><ins><em>you are technically oriented,</em></ins></span> 
is <span class="removed"><del><strong>coming from the 
user's</strong></del></span> <span class="inserted"><ins><em>to get 
your</em></ins></span> own
+    <span class="removed"><del><strong>computer, the TV reports what it is. 
The existence of</strong></del></span> <span class="inserted"><ins><em>router 
(which can
+    be an old computer running completely free software), and set 
up</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span>
+    <span class="inserted"><ins><em>firewall</em></ins></span> to
+    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden</strong></del></span> <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or,</em></ins></span> as <span 
class="removed"><del><strong>it was in
+    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
last resort,
+    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;More or less</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly</em></ins></span> all <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;home security 
cameras&rdquo;</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;The report was as of 2014, but we don't expect</strong></del></span> 
<span class="inserted"><ins><em>Internet, and use a terrestrial antenna
-    instead. Unfortunately,</em></ins></span> this <span 
class="removed"><del><strong>has got
+&lt;p&gt;The report was as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got
 better.&lt;/p&gt;
 
-&lt;p&gt;This shows that laws requiring products</strong></del></span> <span 
class="inserted"><ins><em>is not always possible. Another option,
-    if you are technically oriented, is</em></ins></span> to get <span 
class="removed"><del><strong>users' formal
+&lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span class="inserted"><ins><em>these
+    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
 consent before collecting personal data are totally inadequate.  And
-what happens if a user declines consent?  Probably the TV will say,
-&ldquo;Without</strong></del></span> your <span 
class="removed"><del><strong>consent</strong></del></span> <span 
class="inserted"><ins><em>own router (which can
-    be an old computer running completely free software), and set up a
-    firewall</em></ins></span> to <span class="removed"><del><strong>tracking, 
the</strong></del></span> <span class="inserted"><ins><em>block connections to 
Vizio's servers. Or, as a last resort,
-    you can replace your</em></ins></span> TV <span 
class="removed"><del><strong>will not
+what happens if a user declines consent?  Probably</strong></del></span> <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>TV will say,
+&ldquo;Without</strong></del></span> <span class="inserted"><ins><em>videos. 
That's not
+    security for</em></ins></span> your <span 
class="removed"><del><strong>consent</strong></del></span> <span 
class="inserted"><ins><em>home. Security means making sure they don't 
get</em></ins></span> to <span class="removed"><del><strong>tracking, the TV 
will not
 work.&rdquo;&lt;/p&gt;
 
-&lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>with another model.&lt;/p&gt;
+&lt;p&gt;Proper laws would say that TVs</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo;</em></ins></span> 
would <span class="removed"><del><strong>say</strong></del></span> <span 
class="inserted"><ins><em>be a better
-    name!&lt;/p&gt;
-
-    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>TVs are</strong></del></span> <span 
class="inserted"><ins><em>these
-    manufacturers promise</em></ins></span> not <span 
class="removed"><del><strong>allowed</strong></del></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the
-<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers</em></ins></span> are <span 
class="removed"><del><strong>not allowed to report what</strong></del></span> 
<span class="inserted"><ins><em>very innovative&mdash;at 
blocking</em></ins></span> the
+<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
 &lt;p&gt;Some LG
 TVs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
-    use of independent replacement ink cartridges. Their &ldquo;security
+    <span class="inserted"><ins><em>use of independent replacement ink 
cartridges. Their &ldquo;security
     upgrades&rdquo; occasionally impose new forms of cartridge 
DRM.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
 tyrants&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
@@ -338,8 +359,8 @@
     just happened).&lt;/p&gt;
 
     &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>data may be true,
-but</strong></del></span> <span class="inserted"><ins><em>desired temperature 
requires running
-    nonfree software. With an old-fashioned thermostat, you can 
do</em></ins></span> it <span class="removed"><del><strong>doesn't really 
matter. If it sells</strong></del></span>
+but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
+    nonfree software. With an old-fashioned thermostat, you can 
do</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span>
     <span class="inserted"><ins><em>using controls right on</em></ins></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>thermostat.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -423,45 +444,45 @@
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a
 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
+Some D-Link routers&lt;/a&gt; have</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
+    &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
+    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
+    it, the system has</em></ins></span> a <span 
class="removed"><del><strong>back door for changing settings in a
 dlink of an eye.&lt;/p&gt;
 
-&lt;p&gt;</strong></del></span>
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>grave security 
flaw.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers to be suckers 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764"&gt;Many
 models of routers
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764"&gt;Many
 models</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings</em></ins></span> of <span class="removed"><del><strong>routers
 have back doors&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
-The TP-Link router</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system</em></ins></span> has a <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>grave security 
flaw.&lt;/p&gt;</em></ins></span>
+The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The &lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
-&ldquo;Cube&rdquo; 3D printer</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy</em></ins></span> was <span 
class="removed"><del><strong>designed with DRM&lt;/a&gt;: it won't accept
-third-party printing materials.  It is the Keurig</strong></del></span> <span 
class="inserted"><ins><em>found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it is
-being discontinued, which means that eventually authorized materials won't
-be available and</strong></del></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
+&lt;p&gt;The</strong></del></span>
 
-&lt;p&gt;With a</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201711080"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201711080"&gt;
     &lt;p&gt;Logitech will sabotage
-    all Harmony Link household control devices by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer that gets</strong></del></span>
+    all Harmony Link household control devices by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+&ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it won't accept
+third-party printing materials.  It is</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
-    turning off</em></ins></span> the <span 
class="removed"><del><strong>Respects Your 
Freedom&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>server 
through which the products' supposed owners
+    turning off</em></ins></span> the <span 
class="removed"><del><strong>Keurig of printers.  Now it is
+being discontinued,</strong></del></span> <span 
class="inserted"><ins><em>server through</em></ins></span> which <span 
class="removed"><del><strong>means that eventually authorized materials won't
+be available and the printers may become unusable.&lt;/p&gt;
+
+&lt;p&gt;With a &lt;a 
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer that gets</strong></del></span> the <span 
class="removed"><del><strong>Respects Your 
Freedom&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>products' supposed owners
     communicate with them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The owners suspect</em></ins></span> this <span 
class="removed"><del><strong>problem would not
@@ -497,40 +518,39 @@
 &lt;p&gt;Philips</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;
-    &lt;p&gt;A</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>lightbulbs</strong></del></span> <span 
class="inserted"><ins><em>intravenous pump
-    designed for hospitals is connected to the internet. 
Naturally</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
-have</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
-    its security has</em></ins></span> been <span 
class="removed"><del><strong>designed not</strong></del></span> <span 
class="inserted"><ins><em>cracked&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>lightbulbs &lt;a
+href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
+have been</strong></del></span> <span class="inserted"><ins><em>intravenous 
pump</em></ins></span>
+    designed <span class="removed"><del><strong>not to interact with other 
companies' smart
+lightbulbs&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build it, 
it</strong></del></span> <span class="inserted"><ins><em>for 
hospitals</em></ins></span> is
+<span class="removed"><del><strong>cleverly serving</strong></del></span> 
<span class="inserted"><ins><em>connected to the internet. Naturally &lt;a
+    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;</em></ins></span>
+    its <span class="removed"><del><strong>manufacturer &lt;em&gt;against 
you&lt;/em&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring</em></ins></span> to <span class="removed"><del><strong>interact 
with other companies' smart
-lightbulbs&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;If</strong></del></span> <span 
class="inserted"><ins><em>crackers.)&lt;/small&gt;&lt;/p&gt;
+    referring to crackers.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be</em></ins></span> a <span 
class="removed"><del><strong>product is &ldquo;smart&rdquo;, and you didn't 
build it, it</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all the stings.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is
-<span class="removed"><del><strong>cleverly serving its manufacturer 
&lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a
 
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
 DVDs and Bluray disks have DRM&lt;/a&gt;.
 &lt;/p&gt;
 
-&lt;p&gt;That page uses spin terms</strong></del></span> <span 
class="inserted"><ins><em>unfortunate</em></ins></span> that <span 
class="removed"><del><strong>favor DRM,
-including</strong></del></span> <span class="inserted"><ins><em>the article 
uses the term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+&lt;p&gt;That page uses spin terms</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people</em></ins></span> that <span 
class="removed"><del><strong>favor DRM,
+including</strong></del></span> <span class="inserted"><ins><em>use 
them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
 digital &ldquo;rights&rdquo; management&lt;/a&gt;
 and</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
@@ -565,32 +585,32 @@
     &lt;p&gt;Many models</em></ins></span> of <span 
class="removed"><del><strong>network-connected 
surveillance</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected</em></ins></span> cameras
     <span class="inserted"><ins><em>are tremendously insecure.  
They</em></ins></span> have <span class="inserted"><ins><em>login
     accounts with hard-coded passwords, which can't be changed, 
and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;</strong></del></span>
+<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+security bugs that allow anyone</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
-    is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+    is no way</em></ins></span> to <span class="removed"><del><strong>watch 
through them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705250"&gt;
-    &lt;p&gt;The proprietary code that runs pacemakers,
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big security hole; &lt;a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Samsung claims</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;
+    &lt;p&gt;The proprietary code</em></ins></span> that <span 
class="removed"><del><strong>this is an &ldquo;open&rdquo; platform so the
+problem</strong></del></span> <span class="inserted"><ins><em>runs pacemakers,
     insulin pumps, and other medical devices is &lt;a
-    href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of 
gross</em></ins></span>
-    security <span class="removed"><del><strong>bugs</strong></del></span> 
<span class="inserted"><ins><em>faults&lt;/a&gt;.&lt;/p&gt;
+    href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
+    security faults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705180"&gt;
     &lt;p&gt;Bird and rabbit pets were implemented for Second
-    Life by a company</em></ins></span> that <span 
class="removed"><del><strong>allow anyone</strong></del></span> <span 
class="inserted"><ins><em>tethered their food</em></ins></span> to <span 
class="removed"><del><strong>watch through them&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has</strong></del></span> a <span 
class="removed"><del><strong>big security hole;</strong></del></span> <span 
class="inserted"><ins><em>server.</em></ins></span>  &lt;a
-<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform 
so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
-    It shut down</em></ins></span> the
-<span class="removed"><del><strong>problem is partly</strong></del></span> 
<span class="inserted"><ins><em>server and the pets more or less 
died&lt;/a&gt;.&lt;/p&gt;
+    Life by a company that tethered their food to a server.  &lt;a
+    
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
+    It shut down the server and the pets more or less died&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
@@ -753,7 +773,7 @@
     unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
-    problem is partly the fault of app developers. That is clearly true
+    problem</em></ins></span> is partly the <span 
class="removed"><del><strong>fault of app developers. That is clearly true 
if</strong></del></span> <span class="inserted"><ins><em>fault of app 
developers. That is clearly true
     if the apps are proprietary software.&lt;/p&gt;
 
     &lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going
@@ -878,7 +898,7 @@
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to</em></ins></span> the <span class="removed"><del><strong>fault of app 
developers. That is clearly true if</strong></del></span> <span 
class="inserted"><ins><em>600 millions social media profiles</em></ins></span> 
the <span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>company
+    to the 600 millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>company
     already monitors. Tivo customers</em></ins></span> are <span 
class="removed"><del><strong>proprietary software.&lt;/p&gt;
 
 &lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going to
@@ -1350,7 +1370,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -1361,7 +1381,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/18 23:01:25 $
+$Date: 2020/02/24 17:03:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-appliances.de.po    18 Dec 2019 23:01:25 -0000      1.85
+++ malware-appliances.de.po    24 Feb 2020 17:03:36 -0000      1.86
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -111,6 +111,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -2150,11 +2167,12 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019+} Free Software
+# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free Software
 # | Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016, 2017, 2018 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-appliances.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-appliances.es.po    19 Dec 2019 11:23:37 -0000      1.13
+++ malware-appliances.es.po    24 Feb 2020 17:03:36 -0000      1.14
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2019-12-19 12:08+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -85,6 +86,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -1672,7 +1690,13 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright &copy; 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-appliances.fr.po    26 Dec 2019 20:17:01 -0000      1.142
+++ malware-appliances.fr.po    24 Feb 2020 17:03:36 -0000      1.143
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2019-12-20 23:06+0100\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -1683,8 +1701,9 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-appliances.pot      18 Dec 2019 23:01:25 -0000      1.70
+++ malware-appliances.pot      24 Feb 2020 17:03:36 -0000      1.71
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a "
+"href=\"https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\";>
 "
+"access the user's wifi password</a>, and snoop on the household through "
+"connected surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack "
+"this. Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a "
 "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
 "company made them all cease to work</a> by shutting down that server."
@@ -1115,7 +1132,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, 
Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- malware-appliances.ru.po    19 Dec 2019 06:59:30 -0000      1.177
+++ malware-appliances.ru.po    24 Feb 2020 17:03:36 -0000      1.178
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2018-12-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -84,6 +85,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -1661,8 +1679,10 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- nl.po       21 Feb 2020 23:32:16 -0000      1.174
+++ nl.po       24 Feb 2020 17:03:36 -0000      1.175
@@ -2072,6 +2072,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -3029,15 +3046,17 @@
 "openlgtv.org.ru/wiki/index.php/Achievements\"> are tyrants</a>."
 msgstr ""
 
-# type: Content of: <div><p>
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; [-2013, 2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Malware In Cars+} - GNU Project - Free Software
@@ -3799,18 +3818,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
-#| "Inc."
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Apple's Operating Systems are-]{+Google's Software Is+} Malware - GNU
 # | Project - Free Software Foundation
@@ -7614,14 +7621,14 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, [-2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, [-2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
@@ -8471,19 +8478,6 @@
 "continuing this practice</a>."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2013, [-2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
-#| "Inc."
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Subscriptions+} - GNU Project - Free Software
 # | Foundation
@@ -8527,6 +8521,16 @@
 "below."
 msgstr ""
 
+# type: Content of: <div><p>
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
 # | Foundation
@@ -9739,6 +9743,17 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~ "Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of April, 2019, the files in this directory list around 400 instances "
 #~| "of malicious functionalities, but there are surely thousands more we "
 #~| "don't know about."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- pl.po       21 Feb 2020 23:32:16 -0000      1.173
+++ pl.po       24 Feb 2020 17:03:36 -0000      1.174
@@ -1641,6 +1641,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -2599,11 +2616,12 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015-] {+2016, 2017, 2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; [-2013, 2014, 2015-] {+2016, 2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3345,15 +3363,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015-] {+2016, 2017, 2018, 2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Proprietary-]{+Google's+} Software {+Is Malware+} - GNU Project - Free
 # | Software Foundation
@@ -6989,12 +6998,12 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, [-2014, 2015-] {+2015, 2016, 2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, [-2014, 2015-] {+2015, 2016, 2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
@@ -7869,16 +7878,6 @@
 "continuing this practice</a>."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2013, [-2014, 2015-] {+2015, 2016, 2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Subscriptions+} - GNU Project - Free Software
 # | Foundation
@@ -7919,6 +7918,14 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015-] {+2016, 2017, 2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
 # | Foundation
@@ -9143,6 +9150,13 @@
 #, fuzzy
 #~| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 #~ msgid ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+#~ msgid ""
 #~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 #~ "Foundation, Inc."
 #~ msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- pot 21 Feb 2020 23:32:16 -0000      1.172
+++ pot 24 Feb 2020 17:03:36 -0000      1.173
@@ -1450,6 +1450,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -2399,7 +2416,8 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <title>
@@ -3117,11 +3135,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -6534,7 +6547,7 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 
@@ -7071,12 +7084,6 @@
 "continuing this practice</a>."
 msgstr ""
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
 msgstr ""
@@ -7107,6 +7114,10 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr ""

Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-insecurity.de-diff.html 18 Dec 2019 23:01:25 -0000      1.37
+++ proprietary-insecurity.de-diff.html 24 Feb 2020 17:03:36 -0000      1.38
@@ -103,40 +103,52 @@
     its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;One of the dangers</strong></del></span>
+  &lt;p&gt;One of</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201908310"&gt;
-    &lt;p&gt;A series</em></ins></span> of <span 
class="inserted"><ins><em>vulnerabilities &lt;a
-    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
-    in iOS allowed attackers to gain access to sensitive information
-    including private messages, passwords, photos and contacts stored 
on</em></ins></span>
-    the <span 
class="removed"><del><strong>&ldquo;internet</strong></del></span> <span 
class="inserted"><ins><em>user's iMonster&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The deep insecurity</em></ins></span> of <span 
class="removed"><del><strong>stings&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>iMonsters</em></ins></span> is <span 
class="removed"><del><strong>that, if
-    you lose your internet service, you also &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access</em></ins></span> the <span class="removed"><del><strong>dangers 
of</strong></del></span> <span class="inserted"><ins><em>user's wifi 
password&lt;/a&gt;, and snoop on</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;internet</strong></del></span> <span 
class="inserted"><ins><em>household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge</em></ins></span> of <span 
class="removed"><del><strong>stings&rdquo; is that,</strong></del></span> <span 
class="inserted"><ins><em>the wifi password would not be sufficient to carry
+    out any significant surveillance</em></ins></span> if
+    <span class="removed"><del><strong>you lose your internet service, 
you</strong></del></span> <span class="inserted"><ins><em>the devices 
implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are</em></ins></span> also <span 
class="removed"><del><strong>&lt;a
 
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;For your safety, don't use any appliance with</strong></del></span> 
<span class="inserted"><ins><em>even more pertinent given that
-    Apple's proprietary software makes users totally dependent on Apple
-    for even</em></ins></span> a <span class="removed"><del><strong>connection 
to</strong></del></span> <span class="inserted"><ins><em>modicum of security.  
It also means that</em></ins></span> the <span class="removed"><del><strong>real
+    lose control</strong></del></span> <span class="inserted"><ins><em>used by 
their
+    manufacturers for snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908310"&gt;
+    &lt;p&gt;A series</em></ins></span> of <span 
class="removed"><del><strong>your house and appliances&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;For your safety, don't use any appliance with a 
connection</strong></del></span> <span 
class="inserted"><ins><em>vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers</em></ins></span> to <span 
class="removed"><del><strong>the real
     internet.&lt;/p&gt;
 &lt;/li&gt;
 &lt;li&gt;
-  &lt;p&gt;Amazon recently invited consumers</strong></del></span> <span 
class="inserted"><ins><em>devices do
-    not even try</em></ins></span> to <span class="removed"><del><strong>be 
suckers and</strong></del></span> <span class="inserted"><ins><em>offer 
security against Apple itself.&lt;/p&gt;
+  &lt;p&gt;Amazon recently invited consumers</strong></del></span> <span 
class="inserted"><ins><em>gain access</em></ins></span> to <span 
class="removed"><del><strong>be suckers</strong></del></span> <span 
class="inserted"><ins><em>sensitive information
+    including private messages, passwords, photos</em></ins></span> and <span 
class="removed"><del><strong>&lt;a
+href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you 
know it,</strong></del></span> <span class="inserted"><ins><em>contacts stored 
on</em></ins></span>
+    the <span class="removed"><del><strong>system has a grave security 
flaw.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>user's 
iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908020"&gt;
     &lt;p&gt;Out of 21 gratis Android antivirus apps
-    that were tested by security researchers, eight</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
-    failed</em></ins></span> to <span class="removed"><del><strong>open their 
front doors&lt;/a&gt;. Wouldn't you know it,
-    the system has</strong></del></span> <span 
class="inserted"><ins><em>detect</em></ins></span> a <span 
class="removed"><del><strong>grave security flaw.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;Intel's intentional &ldquo;management engine&rdquo; 
back</strong></del></span> <span class="inserted"><ins><em>test 
virus&lt;/a&gt;. All of them asked for dangerous
+    that were tested by security researchers, eight &lt;a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
     permissions or contained advertising trackers, with seven being more
     risky than the average of the 100 most popular Android apps.&lt;/p&gt;
 
@@ -237,8 +249,8 @@
     real internet.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201711204"&gt;
-    &lt;p&gt;Intel's intentional &ldquo;management engine&rdquo; 
back</em></ins></span> door has &lt;a
+  &lt;li id="M201711204"&gt;</em></ins></span>
+    &lt;p&gt;Intel's intentional &ldquo;management engine&rdquo; back door has 
&lt;a
     
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/"&gt;
     unintended back doors&lt;/a&gt; too.&lt;/p&gt;
   &lt;/li&gt;
@@ -1066,7 +1078,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
@@ -1076,7 +1088,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/18 23:01:25 $
+$Date: 2020/02/24 17:03:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary-insecurity.de.po        18 Dec 2019 23:01:25 -0000      1.140
+++ proprietary-insecurity.de.po        24 Feb 2020 17:03:36 -0000      1.141
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -130,6 +130,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
 "gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
 "xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1599,14 +1616,14 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; <ins>2013-</ins>2018 Free Software Foundation, Inc."
 

Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-insecurity.es.po        21 Jan 2020 12:34:48 -0000      1.27
+++ proprietary-insecurity.es.po        24 Feb 2020 17:03:36 -0000      1.28
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2019-12-19 12:08+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -117,6 +118,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
 "gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
 "xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1274,8 +1292,14 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary-insecurity.fr.po        26 Dec 2019 20:17:01 -0000      1.188
+++ proprietary-insecurity.fr.po        24 Feb 2020 17:03:37 -0000      1.189
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2019-12-20 23:06+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -117,6 +118,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
 "gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
 "xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1282,9 +1300,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2015-2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2015-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary-insecurity.it-diff.html 18 Dec 2019 23:01:25 -0000      1.52
+++ proprietary-insecurity.it-diff.html 24 Feb 2020 17:03:37 -0000      1.53
@@ -108,74 +108,85 @@
   insecurity since anyone, including malicious crackers,</strong></del></span> 
<span class="inserted"><ins><em>this article as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find those accounts and use them</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
     managed</em></ins></span> to <span class="removed"><del><strong>get into
-  users' cameras&lt;/a&gt;.&lt;/p&gt;
-
-&lt;/li&gt;
+  users' cameras&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>interfere the Amazon Ring proprietary system, and 
&lt;a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
+    its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
   &lt;p&gt;
-    Conexant HD Audio Driver Package (version 1.0.0.46</strong></del></span> 
<span class="inserted"><ins><em>interfere the Amazon Ring proprietary 
system,</em></ins></span> and <span class="removed"><del><strong>earlier)
-    pre-installed on 28 models</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
-    its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;
+    Conexant HD Audio Driver Package (version 1.0.0.46</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>earlier)
+    pre-installed</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>28 models</strong></del></span> <span 
class="inserted"><ins><em>the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge</em></ins></span> of <span 
class="removed"><del><strong>HP laptops logged</strong></del></span> the <span 
class="removed"><del><strong>user's
+    keystroke</strong></del></span> <span class="inserted"><ins><em>wifi 
password would not be sufficient</em></ins></span> to <span 
class="removed"><del><strong>a file in</strong></del></span> <span 
class="inserted"><ins><em>carry
+    out any significant surveillance if</em></ins></span> the <span 
class="removed"><del><strong>filesystem. Any process</strong></del></span> 
<span class="inserted"><ins><em>devices implemented proper
+    security, including encryption. But many devices</em></ins></span> with 
<span class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908310"&gt;
-    &lt;p&gt;A series</em></ins></span> of <span 
class="removed"><del><strong>HP laptops logged the user's
-    keystroke to a file</strong></del></span> <span 
class="inserted"><ins><em>vulnerabilities &lt;a
-    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found</em></ins></span>
-    in <span class="removed"><del><strong>the filesystem. Any process with 
access</strong></del></span> <span class="inserted"><ins><em>iOS allowed 
attackers</em></ins></span> to
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers</em></ins></span> to
     <span class="removed"><del><strong>the filesystem or the MapViewOfFile API 
could</strong></del></span> gain access to <span 
class="inserted"><ins><em>sensitive information
     including private messages, passwords, photos and contacts stored 
on</em></ins></span>
     the
-    <span class="removed"><del><strong>log. Furthermore, &lt;a 
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
-    to modzero&lt;/a&gt; the &ldquo;information-leak via Covert Storage
-    Channel enables malware authors to capture keystrokes without
-    taking</strong></del></span> <span class="inserted"><ins><em>user's 
iMonster&lt;/a&gt;.&lt;/p&gt;
+    <span class="removed"><del><strong>log. Furthermore,</strong></del></span> 
<span class="inserted"><ins><em>user's iMonster&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
     Apple's proprietary software makes users totally dependent on Apple
-    for even a modicum of security.  It also means that</em></ins></span> the 
<span class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>devices do
+    for even a modicum of security.  It also means that the devices do
     not even try to offer security against Apple itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908020"&gt;
-    &lt;p&gt;Out</em></ins></span> of <span class="inserted"><ins><em>21 
gratis Android antivirus apps
-    that were tested by security researchers, eight &lt;a
-    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
-    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
-    permissions or contained advertising trackers, with 
seven</em></ins></span> being <span 
class="removed"><del><strong>classified</strong></del></span> <span 
class="inserted"><ins><em>more
-    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(Note that the article refers to these proprietary 
apps</em></ins></span> as <span class="removed"><del><strong>malicious 
task</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;free&rdquo;. It should have said 
&ldquo;gratis&rdquo;
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
+    failed</em></ins></span> to <span 
class="removed"><del><strong>modzero&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>detect a test virus&lt;/a&gt;. All of them asked for 
dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;information-leak via Covert Storage
+    Channel enables malware authors</strong></del></span> <span 
class="inserted"><ins><em>average of the 100 most popular Android 
apps.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that the article refers</em></ins></span> to 
<span class="removed"><del><strong>capture keystrokes without
+    taking</strong></del></span> <span class="inserted"><ins><em>these 
proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
     instead.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
+    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally</em></ins></span> by <span 
class="removed"><del><strong>AV
-    heuristics&rdquo;.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>malicious 
apps.&lt;/p&gt;</em></ins></span>
+    exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201905150"&gt;
-    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
+  &lt;li id="M201905150"&gt;
+    &lt;p&gt;Users caught in the jail</em></ins></span> of <span 
class="removed"><del><strong>being classified</strong></del></span> <span 
class="inserted"><ins><em>an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
+    inexcusable even if it didn't lead to security threats</em></ins></span> 
as <span class="removed"><del><strong>malicious task by AV
+    heuristics&rdquo;.
+  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201903210"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;</em></ins></span>
     &lt;p&gt;The <span class="inserted"><ins><em>Medtronics Conexus Telemetry 
Protocol has &lt;a
     
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
     two vulnerabilities that affect several models of implantable
@@ -193,10 +204,10 @@
     manufacturer (now Amazon) can watch all the time. Now it turns out
     that &lt;a
     
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
-    anyone else can also watch,</em></ins></span> and <span 
class="inserted"><ins><em>fake videos too&lt;/a&gt;.&lt;/p&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
-    unintentional and Amazon will probably fix it. However, we
+    unintentional</em></ins></span> and <span class="inserted"><ins><em>Amazon 
will probably fix it. However, we
     do not expect Amazon to change the design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
@@ -1033,7 +1044,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -1044,7 +1055,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/18 23:01:25 $
+$Date: 2020/02/24 17:03:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- proprietary-insecurity.it.po        18 Dec 2019 23:01:25 -0000      1.157
+++ proprietary-insecurity.it.po        24 Feb 2020 17:03:37 -0000      1.158
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -125,6 +125,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
 "gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
 "xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1463,13 +1480,13 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary-insecurity.ja-diff.html 31 Dec 2019 01:04:21 -0000      1.72
+++ proprietary-insecurity.ja-diff.html 24 Feb 2020 17:03:37 -0000      1.73
@@ -111,35 +111,48 @@
     its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201908310"&gt;</em></ins></span>
-    &lt;p&gt;A <span class="inserted"><ins><em>series of 
vulnerabilities</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found</em></ins></span>
-    in
-<span class="removed"><del><strong>Internet Explorer and Edge&lt;/a&gt; allows 
an attacker</strong></del></span> <span class="inserted"><ins><em>iOS allowed 
attackers</em></ins></span> to <span class="removed"><del><strong>retrieve
-Microsoft account credentials, if</strong></del></span> <span 
class="inserted"><ins><em>gain access to sensitive information
-    including private messages, passwords, photos and contacts stored 
on</em></ins></span>
-    the <span class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>user's iMonster&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;A</strong></del></span>
 
-    &lt;p&gt;The deep insecurity of iMonsters</em></ins></span> is <span 
class="removed"><del><strong>tricked into visiting</strong></del></span> <span 
class="inserted"><ins><em>even more pertinent given that
-    Apple's proprietary software makes users totally dependent on Apple
-    for even</em></ins></span> a
-<span class="removed"><del><strong>malicious link.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in
+Internet Explorer</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>Edge&lt;/a&gt; allows an 
attacker</strong></del></span> <span class="inserted"><ins><em>snoop on the 
household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be 
sufficient</em></ins></span> to <span class="removed"><del><strong>retrieve
+Microsoft account credentials,</strong></del></span> <span 
class="inserted"><ins><em>carry
+    out any significant surveillance</em></ins></span> if the <span 
class="removed"><del><strong>user is tricked into visiting a
+malicious link.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
-WhatsApp messages are</strong></del></span> <span 
class="inserted"><ins><em>modicum of security.  It also means that the devices 
do</em></ins></span>
-    not <span class="removed"><del><strong>entirely deleted&lt;/a&gt;. They 
can be recovered
+WhatsApp messages</strong></del></span> <span 
class="inserted"><ins><em>devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they</em></ins></span> are <span 
class="removed"><del><strong>not entirely deleted&lt;/a&gt;. They can be 
recovered
 in various ways.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>also used by 
their
+    manufacturers for snooping.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;A vulnerability in Apple's Image I/O API allowed an 
attacker</strong></del></span> <span class="inserted"><ins><em>even 
try</em></ins></span> to
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908310"&gt;</em></ins></span>
+    &lt;p&gt;A <span 
class="removed"><del><strong>vulnerability</strong></del></span> <span 
class="inserted"><ins><em>series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found</em></ins></span>
+    in <span class="removed"><del><strong>Apple's Image I/O 
API</strong></del></span> <span class="inserted"><ins><em>iOS</em></ins></span> 
allowed <span class="removed"><del><strong>an attacker</strong></del></span> 
<span class="inserted"><ins><em>attackers</em></ins></span> to
 <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-  malacious code from any application</strong></del></span> <span 
class="inserted"><ins><em>offer security against Apple itself.&lt;/p&gt;
+  malacious code from any application</strong></del></span> <span 
class="inserted"><ins><em>gain access to sensitive information
+    including private messages, passwords, photos and contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908020"&gt;
@@ -972,7 +985,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -983,7 +996,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/02/24 17:03:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary-insecurity.ja.po        31 Dec 2019 01:04:21 -0000      1.130
+++ proprietary-insecurity.ja.po        24 Feb 2020 17:03:37 -0000      1.131
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -107,6 +107,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
 "gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
 "xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1062,7 +1079,7 @@
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary-insecurity.pot  18 Dec 2019 23:01:25 -0000      1.96
+++ proprietary-insecurity.pot  24 Feb 2020 17:03:37 -0000      1.97
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -81,6 +81,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a "
+"href=\"https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\";>
 "
+"access the user's wifi password</a>, and snoop on the household through "
+"connected surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack "
+"this. Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A series of vulnerabilities <a "
 
"href=\"https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/\";>found
 "
 "in iOS allowed attackers to gain access to sensitive information including "
@@ -843,7 +860,7 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary-insecurity.ru.po        19 Dec 2019 06:59:30 -0000      1.239
+++ proprietary-insecurity.ru.po        24 Feb 2020 17:03:37 -0000      1.240
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2018-12-02 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -112,6 +113,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A series of vulnerabilities <a href=\"https://www.forbes.com/sites/";
 "gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
 "xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1255,10 +1273,10 @@
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary-surveillance.de-diff.html       21 Feb 2020 23:32:16 -0000      
1.107
+++ proprietary-surveillance.de-diff.html       24 Feb 2020 17:03:37 -0000      
1.108
@@ -1386,193 +1386,119 @@
     app <span class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>is mandatory at some workplaces.&lt;/p&gt;
 
     &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
+        movements before and</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a clarification
-    saying</em></ins></span> that <span class="removed"><del><strong>include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop</strong></del></span> <span 
class="inserted"><ins><em>the tests were only performed</em></ins></span> on 
<span class="removed"><del><strong>what radio</strong></del></span> <span 
class="inserted"><ins><em>the Android version
-    of the app,</em></ins></span> and <span class="removed"><del><strong>TV 
programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>that, according to 
Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be 
conducted</em></ins></span> on <span class="removed"><del><strong>various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>Apple's operating 
system.&rdquo;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook</em></ins></span> app &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you to share the picture you take according to 
who</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it</em></ins></span> is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>turned 
off&lt;/a&gt;, after tricking them
-    into giving</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>app broad permissions in order</em></ins></span> to 
<span class="removed"><del><strong>Facebook's servers</strong></del></span> 
<span class="inserted"><ins><em>use one of its
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable</em></ins></span> after <span 
class="inserted"><ins><em>copy-pasting in a text editor) includes a 
clarification
+    saying that</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>tests were 
only performed on</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for</strong></del></span> <span class="inserted"><ins><em>Android 
version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo;</em></ins></span> surveillance <span 
class="inserted"><ins><em>could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201909091"&gt;
+    &lt;p&gt;The Facebook app &lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when it</em></ins></span> is <span 
class="removed"><del><strong>inadequate as</strong></del></span> <span 
class="inserted"><ins><em>turned off&lt;/a&gt;, after tricking them
+    into giving the app broad permissions in order to use one of its
     functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>Maya &lt;a
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
     
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> users' <span 
class="removed"><del><strong>pictures are private
-      anymore, even if the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span 
class="inserted"><ins><em>lives</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of who downloads a</em></ins></span> proprietary 
<span class="removed"><del><strong>malware (DRM and snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it</strong></del></span>
-    <span class="inserted"><ins><em>program</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span> a <span 
class="removed"><del><strong>way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>form of surveillance.  There</em></ins></span> is a 
<span class="removed"><del><strong>typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span>
-    proprietary <span class="removed"><del><strong>apps</strong></del></span> 
<span class="inserted"><ins><em>program</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
-    apps</strong></del></span> <span class="inserted"><ins><em>adjusting a 
certain telescopic rifle sight. &lt;a
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>protection</strong></del></span> <span 
class="inserted"><ins><em>proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
     
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>list of all the 10,000 or more people
+    A US prosecutor has demanded the list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not be a list of 
who</em></ins></span> has
-    <span class="removed"><del><strong>installed.</strong></del></span> <span 
class="inserted"><ins><em>installed
+    &lt;p&gt;With a free program there would not be a list of who has installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. 
Not</strong></del></span> <span class="inserted"><ins><em>privacy-enhancing 
features
-    of the operating system, in order to gather</em></ins></span> as <span 
class="removed"><del><strong>bad</strong></del></span> <span 
class="inserted"><ins><em>much private data</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span>
-    <span class="inserted"><ins><em>they possibly can.&lt;/p&gt;
-
-    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>software we run.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules</em></ins></span> against <span 
class="removed"><del><strong>massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android</em></ins></span> apps <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>can track
-    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>user says &lt;a
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS</strong></del></span> <span 
class="inserted"><ins><em>allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted</strong></del></span> <span 
class="inserted"><ins><em>Android,
-    exploited intentionally</em></ins></span> by <span 
class="removed"><del><strong>the question of whether the app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>malicious apps.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span>
+  &lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool</em></ins></span> for <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt;</em></ins></span> by <span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>natalist Christians. 
 It spreads distrust
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>run a proprietary 
phone app&lt;/a&gt;</em></ins></span> to <span class="inserted"><ins><em>be 
allowed into</em></ins></span>
-    the <span class="inserted"><ins><em>event.&lt;/p&gt;
-
-    &lt;p&gt;This</em></ins></span> app <span 
class="removed"><del><strong>developer but did not
-      ask about sending it to other companies.  This shows the
-      weakness</strong></del></span> <span class="inserted"><ins><em>is a 
spyware that can snoop on a lot</em></ins></span> of
-    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and has &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
+
+    &lt;p&gt;This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. 
Even though the
+    available to employers and insurance companies&lt;/a&gt;. Even though the
     data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
     traced back to the woman who uses the app.&lt;/p&gt;
 
     &lt;p&gt;This has harmful implications for women's rights to equal 
employment
     and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>do so.</em></ins></span> A <span 
class="removed"><del><strong>free software flashlight</strong></del></span>
-    <span class="inserted"><ins><em>free-software</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that does more or less the same thing without
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
     spying on you is available from &lt;a
     href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+  &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks the movements of Android phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>the phone 
has to be responsible for sending
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
     the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1586,8 +1512,8 @@
     surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201903201"&gt;</em></ins></span>
-    &lt;p&gt;A <span class="removed"><del><strong>remote-control sex toy 
was</strong></del></span> <span class="inserted"><ins><em>study of 24 
&ldquo;health&rdquo; apps</em></ins></span> found <span 
class="inserted"><ins><em>that 19 of them &lt;a
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
     send sensitive personal data to third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
@@ -2326,204 +2252,339 @@
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users</em></ins></span> to <span class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>new combined surveillance by 
default.&lt;/p&gt;</em></ins></span>
+    users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>toys My Friend Cayla</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize</em></ins></span> and <span 
class="removed"><del><strong>i-Que transmit</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
-      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;
+  &lt;li id="M201507240"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV &lt;a
     
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops</em></ins></span> on <span class="removed"><del><strong>a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>what programs 
people watch,</em></ins></span> and even <span 
class="removed"><del><strong>speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    snoops on what programs people watch, and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make</em></ins></span> its <span 
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
-    users <span class="removed"><del><strong>through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201502090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung 
&ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>US or some
-    other government.&lt;/p&gt;
+  &lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs</em></ins></span> 
snoop on what <span class="removed"><del><strong>radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what</strong></del></span>
+    users <span class="removed"><del><strong>post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when 
first sold.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless</em></ins></span> 
it <span class="removed"><del><strong>was surrounded</strong></del></span> 
<span class="inserted"><ins><em>is done</em></ins></span> by <span 
class="removed"><del><strong>a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than</strong></del></span> free
-    software <span class="removed"><del><strong>which users could have
-      checked and changed.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>internet</em></ins></span> to <span 
class="removed"><del><strong>who
+      is in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
+    Nuance can save it and would then have</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>give it</em></ins></span> to <span 
class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    other government.&lt;/p&gt;
     
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>in your own computer.&lt;/p&gt;
+    &lt;p&gt;Speech recognition is not</em></ins></span> to be
+      <span class="removed"><del><strong>sent across the 
wire</strong></del></span> <span class="inserted"><ins><em>trusted unless it is 
done by free
+    software in your own computer.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
+    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report</em></ins></span> was <span 
class="removed"><del><strong>sued for collecting lots</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
+    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products to get users' formal
-    consent before collecting personal</em></ins></span> data <span 
class="removed"><del><strong>may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>are totally inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>a
-      data broker,</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>data broker</strong></del></span> <span 
class="inserted"><ins><em>TV will not
-    work.&rdquo;&lt;/p&gt;
+    &lt;p&gt;This shows that laws requiring products to get</em></ins></span> 
users' <span class="removed"><del><strong>pictures</strong></del></span> <span 
class="inserted"><ins><em>formal
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>private
+      anymore, even</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
+    And what happens</em></ins></span> if <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>declines consent? 
Probably the TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>have been able</strong></del></span> <span 
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to 
<span class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the
-    user <span class="removed"><del><strong>was.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    work.&rdquo;&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered</strong></del></span> 
<span class="inserted"><ins><em>user watches, and the switch</em></ins></span> 
to <span class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a <span class="removed"><del><strong>total of 
C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting</strong></del></span> <span class="inserted"><ins><em>the 
switch</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
+    really means nothing; the server could save</em></ins></span> that <span 
class="inserted"><ins><em>data anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on</em></ins></span> the <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    product could spy this way.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span> <span 
class="inserted"><ins><em>404 error
-    really means nothing;</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>server could save 
that data anyway.)&lt;/p&gt; 
+  &lt;li id="M201212170"&gt;
+    &lt;p id="break-security-smarttv"&gt;&lt;a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+    Crackers found</em></ins></span> a way to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>break security on</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
-    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>patch</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
-    product</em></ins></span> could <span class="removed"><del><strong>listen 
to these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>spy this way.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo;</em></ins></span> devices 
<span class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;,</em></ins></span> 
which <span class="removed"><del><strong>other
+    apps</strong></del></span> <span class="inserted"><ins><em>save it
+    long-term.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span> <span 
class="inserted"><ins><em>video shows everyone</em></ins></span> that <span 
class="removed"><del><strong>at least is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201212170"&gt;
-    &lt;p id="break-security-smarttv"&gt;&lt;a
-    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
-    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+    &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>the user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>how Ring 
used</em></ins></span> to <span class="inserted"><ins><em>let individual 
employees look
+    at</em></ins></span> the <span class="removed"><del><strong>snooping done 
by the phone company, and perhaps by</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent that
+    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>OS in</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon 
gets</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
 
+      &lt;p&gt;Don't be distracted by</strong></del></span>
+    <span class="inserted"><ins><em>video&mdash;Amazon expects society to 
surrender to.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span <span class="removed"><del><strong>class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy</em></ins></span> of 
<span class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in</em></ins></span> the <span 
class="removed"><del><strong>app developers</strong></del></span> <span 
class="inserted"><ins><em>videos. That's not
+    security for your home. Security means making sure they 
don't</em></ins></span> get
+      <span class="removed"><del><strong>users</strong></del></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>see through your 
camera.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it asked the user to
+      approve sending personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone</em></ins></span> to <span 
class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511250"&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when</em></ins></span> the <span class="removed"><del><strong>app 
developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="removed"><del><strong>to other companies.  This shows the
+      weakness of</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+    to <span class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+
   &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span>
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture</em></ins></span> to <span 
class="removed"><del><strong>report its location</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
-    long-term.&lt;/p&gt;
+  &lt;li id="M201711244"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by, the user's front door.&lt;/p&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>toys with</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
+      enable crackers</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech, and even speak</strong></del></span> <span 
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
+    into <span class="inserted"><ins><em>one.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The article focuses on how Ring used</em></ins></span> to <span 
class="removed"><del><strong>someone else and</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look
-    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="removed"><del><strong>transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
-      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>prevent</em></ins></span> that <span 
class="removed"><del><strong>connects</strong></del></span>
-    <span class="inserted"><ins><em>secondary abuse, but the primary 
abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society</em></ins></span> to <span 
class="inserted"><ins><em>surrender to.&lt;/p&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;</em></ins></span>
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
+
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;
+
+    &lt;p&gt;The company that made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for collecting lots of personal information about how people
+    used it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer</em></ins></span> an <span 
class="removed"><del><strong>unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is a back door, but that 
could</strong></del></span> <span class="inserted"><ins><em>unencrypted copy of 
everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; 
would</em></ins></span> be a
-      <span class="removed"><del><strong>misunderstanding.  
However,</strong></del></span> <span class="inserted"><ins><em>better
-    name!&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo;</em></ins></span> toys with microphones 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
+    manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    conversations was unacceptable by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>is certainly surveillance, at
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;An LG</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>watch is designed
+      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location to someone else</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>i-Que</em></ins></span> transmit
+       <span class="removed"><del><strong>conversations 
too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span class="removed"><del><strong>an 
unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but that could 
be</strong></del></span> <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;,</em></ins></span> a
+      <span class="removed"><del><strong>misunderstanding.  However, it is 
certainly surveillance, at
       least.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>look</em></ins></span> at <span 
class="removed"><del><strong>Low Level&lt;/h3&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>what's</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>speech recognition
+    company based</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -2532,15 +2593,14 @@
 &lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
 Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install 
is</strong></del></span> <span class="inserted"><ins><em>videos. 
That's</em></ins></span> not <span class="removed"><del><strong>really
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span>
-    <span class="inserted"><ins><em>security for your home. Security means 
making</em></ins></span> sure <span class="inserted"><ins><em>they don't 
get</em></ins></span> to <span class="removed"><del><strong>place new items on 
top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2550,242 +2610,181 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+      &lt;p&gt;Specifically, it</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>remotely control</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+  &lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
       
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>to outsmart 
you.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
       specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator &lt;a
-    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
-    body), as well as the vibration frequency.&lt;/p&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>statements about their
-    products, rather than free software which users could have checked
-    and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about how people
-    used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of 
C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, 
if</strong></del></span> its <span class="removed"><del><strong>manufacturer 
can communicate</strong></del></span>
-    <span class="inserted"><ins><em>customers.&lt;/p&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance</em></ins></span> if <span 
class="removed"><del><strong>its manufacturer can 
communicate</strong></del></span> <span class="inserted"><ins><em>the devices 
implemented proper
+    security, including encryption. But many devices</em></ins></span> with 
<span class="removed"><del><strong>it,</strong></del></span> <span 
class="inserted"><ins><em>proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>it,
-      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>fact
-      that</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>device is tethered to a server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates that</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it</em></ins></span> is <span class="inserted"><ins><em>not supposed 
to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>surveillance device. &lt;a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera</strong></del></span> <span 
class="inserted"><ins><em>thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span 
class="removed"><del><strong>company
-      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there</em></ins></span> is <span class="removed"><del><strong>an 
example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>no
+    way to see or control what it records or sends.&lt;/p&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest 
Cam</strong></del></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer, 
based</strong></del></span> <span class="inserted"><ins><em>data 
remain</em></ins></span> on <span class="inserted"><ins><em>other 
servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting</em></ins></span> the <span class="removed"><del><strong>fact
+      that the device is tethered to a server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't 
cancel</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>wrong of
+    collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers</em></ins></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>company
+      surveillance capability.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;
+    &lt;p&gt;The</strong></del></span> Nest <span 
class="removed"><del><strong>Cam &ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>thermostat,</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>Philips
+    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to outsmart
+      you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript 
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ 
garage opener</em></ins></span> and <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span> <span class="inserted"><ins><em>the 
Sonos
+    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>servers</em></ins></span>
+    the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+  &lt;li&gt;&lt;p&gt;Adobe</strong></del></span> <span 
class="inserted"><ins><em>devices are tethered to. Moreover, they 
are</em></ins></span> made <span class="removed"><del><strong>&ldquo;Digital 
Editions,&rdquo; the e-reader used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
       send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>snoop on 
other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      needed</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
-    subcontractors discloses a thousand confidential voice recordings,
-    users were easily identified from these recordings.&lt;/p&gt;
-
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what it records or sends.&lt;/p&gt;
-
-    &lt;p&gt;Rather than trying to better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf 
has</strong></del></span>
+    <span class="inserted"><ins><em>Alexa. As</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
   effectively
   anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  access its computers remotely and make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
-    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
-    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
-    even if <span class="removed"><del><strong>it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>accessed by
-    advertising companies and government agencies. In other words,
-    deleting the collected information doesn't cancel the wrong of
-    collecting it.&lt;/p&gt;
-
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon</em></ins></span> has <span 
class="removed"><del><strong>no
+    &lt;p&gt;That's easy to do because the system has no authentication when
+    accessed through the modem.  However, even if it asked for
+    authentication, you couldn't be confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>result, 
Amazon</em></ins></span> has <span class="removed"><del><strong>no
     access.  The software</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
     at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car is
     proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
@@ -3696,7 +3695,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/21 23:32:16 $
+$Date: 2020/02/24 17:03:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary-surveillance.de.po      21 Feb 2020 23:32:17 -0000      1.322
+++ proprietary-surveillance.de.po      24 Feb 2020 17:03:37 -0000      1.323
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -4338,6 +4338,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-surveillance.es.po      23 Feb 2020 11:03:35 -0000      1.28
+++ proprietary-surveillance.es.po      24 Feb 2020 17:03:37 -0000      1.29
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2020-02-23 11:24+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -3734,6 +3735,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.496
retrieving revision 1.497
diff -u -b -r1.496 -r1.497
--- proprietary-surveillance.fr.po      24 Feb 2020 13:52:40 -0000      1.496
+++ proprietary-surveillance.fr.po      24 Feb 2020 17:03:37 -0000      1.497
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2020-02-24 14:52+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3741,6 +3742,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary-surveillance.it-diff.html       21 Feb 2020 23:32:17 -0000      
1.174
+++ proprietary-surveillance.it-diff.html       24 Feb 2020 17:03:37 -0000      
1.175
@@ -2695,6 +2695,20 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
@@ -3469,7 +3483,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/21 23:32:17 $
+$Date: 2020/02/24 17:03:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- proprietary-surveillance.it.po      21 Feb 2020 23:32:17 -0000      1.335
+++ proprietary-surveillance.it.po      24 Feb 2020 17:03:37 -0000      1.336
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -4093,6 +4093,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary-surveillance.ja-diff.html       21 Feb 2020 23:32:17 -0000      
1.191
+++ proprietary-surveillance.ja-diff.html       24 Feb 2020 17:03:37 -0000      
1.192
@@ -2609,6 +2609,20 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
@@ -3308,7 +3322,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/21 23:32:17 $
+$Date: 2020/02/24 17:03:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- proprietary-surveillance.ja.po      21 Feb 2020 23:32:17 -0000      1.317
+++ proprietary-surveillance.ja.po      24 Feb 2020 17:03:37 -0000      1.318
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3194,6 +3194,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary-surveillance.pot        21 Feb 2020 23:32:17 -0000      1.256
+++ proprietary-surveillance.pot        24 Feb 2020 17:03:37 -0000      1.257
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2528,6 +2528,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a "
+"href=\"https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\";>
 "
+"access the user's wifi password</a>, and snoop on the household through "
+"connected surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack "
+"this. Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a "
 
"href=\"https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/\";>even
 "
 "when it is not supposed to listen</a>. Thus, when one of Google's "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.589
retrieving revision 1.590
diff -u -b -r1.589 -r1.590
--- proprietary-surveillance.ru.po      21 Feb 2020 23:32:17 -0000      1.589
+++ proprietary-surveillance.ru.po      24 Feb 2020 17:03:37 -0000      1.590
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -3713,6 +3713,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google &ldquo;Assistant&rdquo; records users' conversations <a href="
 "\"https://arstechnica.com/information-technology/2019/07/google-defends-";
 "listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.de-diff.html    17 Feb 2020 08:35:26 -0000      1.146
+++ proprietary.de-diff.html    24 Feb 2020 17:03:37 -0000      1.147
@@ -57,17 +57,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -212,16 +212,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202002020"&gt;
-    &lt;p&gt;Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then &lt;a
-    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
-    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
-    in isolated sandboxes, but developers have found ways to access the
-    data by other means, and there is nothing the user can do to stop
-    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
@@ -246,6 +248,18 @@
     additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912171"&gt;
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
@@ -254,16 +268,6 @@
     cracking the car's computer, which is always hidden and running with
     proprietary software.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -326,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary.de.po   17 Feb 2020 08:35:26 -0000      1.187
+++ proprietary.de.po   24 Feb 2020 17:03:37 -0000      1.188
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -455,18 +455,19 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -496,6 +497,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -503,16 +520,6 @@
 "with proprietary software."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device.  Many employers demand "
-"to do this.  For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.255
retrieving revision 1.256
diff -u -b -r1.255 -r1.256
--- proprietary.es.po   17 Feb 2020 12:08:08 -0000      1.255
+++ proprietary.es.po   24 Feb 2020 17:03:37 -0000      1.256
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -312,28 +313,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
 msgstr ""
-"Muchas aplicaciones de Android engañan a los usuarios al pedirles que "
-"decidan qué permisos otorgar al programa, para a continuación <a href="
-"\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-";
-"permissions-to-access-sensitive-data/\">ignorar sus preferencias</a>."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
 msgstr ""
-"Se supone que el sistema Android evita el filtrado de datos al ejecutar las "
-"aplicaciones en entornos aislados, pero los desarrolladores han encontrado "
-"maneras de acceder a los datos por otros medios. Y no hay nada que el "
-"usuario pueda hacer para evitarlo, ya que tanto el sistema como las "
-"aplicaciones son privativas."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -377,6 +370,31 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+"Muchas aplicaciones de Android engañan a los usuarios al pedirles que "
+"decidan qué permisos otorgar al programa, para a continuación <a href="
+"\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-";
+"permissions-to-access-sensitive-data/\">ignorar sus preferencias</a>."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+"Se supone que el sistema Android evita el filtrado de datos al ejecutar las "
+"aplicaciones en entornos aislados, pero los desarrolladores han encontrado "
+"maneras de acceder a los datos por otros medios. Y no hay nada que el "
+"usuario pueda hacer para evitarlo, ya que tanto el sistema como las "
+"aplicaciones son privativas."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -390,23 +408,6 @@
 "ordenador del vehículo, que está siempre oculto y funciona con software "
 "privativo."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device.  Many employers demand "
-"to do this.  For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-"Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos Android "
-"proporcionan a los empleadores potentes <a href=\"https://www.fastcompany.";
-"com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
-"privacy\">capacidades de espionaje y sabotaje</a> en el caso de que estos "
-"instalen su propio software en el dispositivo. Muchos empleadores exigen "
-"hacerlo. Para el empleado esto no es sino otro software privativo, tan "
-"fundamentalmente injusto y peligroso como cualquier otro software privativo."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -484,6 +485,24 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "iMonsters and Android phones, when used for work, give employers powerful "
+#~ "<a href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-";
+#~ "phone-for-work-say-goodbye-to-your-privacy\"> snooping and sabotage "
+#~ "capabilities</a> if they install their own software on the device.  Many "
+#~ "employers demand to do this.  For the employee, this is simply nonfree "
+#~ "software, as fundamentally unjust and as dangerous as any other nonfree "
+#~ "software."
+#~ msgstr ""
+#~ "Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos Android "
+#~ "proporcionan a los empleadores potentes <a href=\"https://www.fastcompany.";
+#~ "com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
+#~ "privacy\">capacidades de espionaje y sabotaje</a> en el caso de que estos "
+#~ "instalen su propio software en el dispositivo. Muchos empleadores exigen "
+#~ "hacerlo. Para el empleado esto no es sino otro software privativo, tan "
+#~ "fundamentalmente injusto y peligroso como cualquier otro software "
+#~ "privativo."
+
+#~ msgid ""
 #~ "The Amazon Ring app does <a href=\"https://www.theguardian.com/";
 #~ "technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"
 #~ "\"> surveillance for other companies as well as for Amazon</a>."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- proprietary.fr.po   17 Feb 2020 10:05:13 -0000      1.303
+++ proprietary.fr.po   24 Feb 2020 17:03:37 -0000      1.304
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2020-02-17 11:03+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -308,29 +309,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
 msgstr ""
-"Beaucoup d'applis Android dupent leurs utilisateurs en leur demandant de "
-"décider quelles permissions doit avoir le programme, et ensuite <a href="
-"\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-";
-"permissions-to-access-sensitive-data/\">ne tiennent pas compte de ces "
-"permissions</a>."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
 msgstr ""
-"Le système Android est censé éviter les fuites de données en exécutant 
les "
-"applis dans des « bacs à sable » isolés, mais les développeurs ont 
trouvé "
-"moyen d'accéder aux données par d'autres moyens. Il n'y a rien que "
-"l'utilisateur puisse faire pour les en empêcher, puisque le système et "
-"l'appli sont tous deux privateurs."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -374,6 +366,32 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+"Beaucoup d'applis Android dupent leurs utilisateurs en leur demandant de "
+"décider quelles permissions doit avoir le programme, et ensuite <a href="
+"\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-";
+"permissions-to-access-sensitive-data/\">ne tiennent pas compte de ces "
+"permissions</a>."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+"Le système Android est censé éviter les fuites de données en exécutant 
les "
+"applis dans des « bacs à sable » isolés, mais les développeurs ont 
trouvé "
+"moyen d'accéder aux données par d'autres moyens. Il n'y a rien que "
+"l'utilisateur puisse faire pour les en empêcher, puisque le système et "
+"l'appli sont tous deux privateurs."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -387,23 +405,6 @@
 "s'introduire dans l'ordinateur de la voiture, qui est toujours caché et "
 "fonctionne avec un logiciel privateur."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device.  Many employers demand "
-"to do this.  For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-"Lorsqu'ils sont utilisés sur le lieu de travail, les iMonstres et les "
-"téléphones Android donnent aux utilisateurs des <a href=\"https://www.";
-"fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-"
-"to-your-privacy\">moyens puissants de surveillance et de sabotage</a> s'ils "
-"y installent leur propre logiciel. De nombreux employeurs l'exigent. Pour "
-"l'employé, c'est simplement un logiciel privateur, aussi fondamentalement "
-"injuste et dangereux que n'importe quel autre logiciel privateur."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -478,6 +479,24 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "iMonsters and Android phones, when used for work, give employers powerful "
+#~ "<a href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-";
+#~ "phone-for-work-say-goodbye-to-your-privacy\"> snooping and sabotage "
+#~ "capabilities</a> if they install their own software on the device.  Many "
+#~ "employers demand to do this.  For the employee, this is simply nonfree "
+#~ "software, as fundamentally unjust and as dangerous as any other nonfree "
+#~ "software."
+#~ msgstr ""
+#~ "Lorsqu'ils sont utilisés sur le lieu de travail, les iMonstres et les "
+#~ "téléphones Android donnent aux utilisateurs des <a href=\"https://www.";
+#~ "fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-"
+#~ "goodbye-to-your-privacy\">moyens puissants de surveillance et de "
+#~ "sabotage</a> s'ils y installent leur propre logiciel. De nombreux "
+#~ "employeurs l'exigent. Pour l'employé, c'est simplement un logiciel "
+#~ "privateur, aussi fondamentalement injuste et dangereux que n'importe quel "
+#~ "autre logiciel privateur."
+
+#~ msgid ""
 #~ "The Amazon Ring app does <a href=\"https://www.theguardian.com/";
 #~ "technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"
 #~ "\"> surveillance for other companies as well as for Amazon</a>."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary.it-diff.html    17 Feb 2020 08:35:26 -0000      1.158
+++ proprietary.it-diff.html    24 Feb 2020 17:03:37 -0000      1.159
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,16 +211,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202002020"&gt;
-    &lt;p&gt;Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then &lt;a
-    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
-    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
-    in isolated sandboxes, but developers have found ways to access the
-    data by other means, and there is nothing the user can do to stop
-    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
@@ -245,6 +247,18 @@
     additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912171"&gt;
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
@@ -253,16 +267,6 @@
     cracking the car's computer, which is always hidden and running with
     proprietary software.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -325,7 +329,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary.it.po   17 Feb 2020 08:35:26 -0000      1.196
+++ proprietary.it.po   24 Feb 2020 17:03:37 -0000      1.197
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -459,18 +459,19 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -500,6 +501,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -507,16 +524,6 @@
 "with proprietary software."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device.  Many employers demand "
-"to do this.  For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.ja-diff.html    17 Feb 2020 08:35:26 -0000      1.162
+++ proprietary.ja-diff.html    24 Feb 2020 17:03:37 -0000      1.163
@@ -209,16 +209,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202002020"&gt;
-    &lt;p&gt;Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then &lt;a
-    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
-    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
-    in isolated sandboxes, but developers have found ways to access the
-    data by other means, and there is nothing the user can do to stop
-    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
@@ -243,6 +245,18 @@
     additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912171"&gt;
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
@@ -251,16 +265,6 @@
     cracking the car's computer, which is always hidden and running with
     proprietary software.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -323,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary.ja.po   17 Feb 2020 08:35:26 -0000      1.180
+++ proprietary.ja.po   24 Feb 2020 17:03:37 -0000      1.181
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -320,18 +320,19 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -361,6 +362,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -368,16 +385,6 @@
 "with proprietary software."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device.  Many employers demand "
-"to do this.  For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary.nl-diff.html    17 Feb 2020 08:35:26 -0000      1.159
+++ proprietary.nl-diff.html    24 Feb 2020 17:03:37 -0000      1.160
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,16 +211,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202002020"&gt;
-    &lt;p&gt;Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then &lt;a
-    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
-    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
-    in isolated sandboxes, but developers have found ways to access the
-    data by other means, and there is nothing the user can do to stop
-    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
@@ -245,6 +247,18 @@
     additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912171"&gt;
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
@@ -253,16 +267,6 @@
     cracking the car's computer, which is always hidden and running with
     proprietary software.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -325,7 +329,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.nl.po   17 Feb 2020 08:35:26 -0000      1.170
+++ proprietary.nl.po   24 Feb 2020 17:03:37 -0000      1.171
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -363,18 +363,19 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -404,6 +405,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -411,16 +428,6 @@
 "with proprietary software."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device.  Many employers demand "
-"to do this.  For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary.pl-diff.html    17 Feb 2020 08:35:26 -0000      1.176
+++ proprietary.pl-diff.html    24 Feb 2020 17:03:37 -0000      1.177
@@ -114,8 +114,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>January, 2020, the pages in this directory 
list around 450
-instances of malicious functionalities (with more than 500 references to
+&lt;p&gt;As of January, 2020, the pages in this directory list around 450
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 500 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -155,17 +155,17 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -186,10 +186,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -209,16 +209,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202002020"&gt;
-    &lt;p&gt;Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then &lt;a
-    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
-    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
-    in isolated sandboxes, but developers have found ways to access the
-    data by other means, and there is nothing the user can do to stop
-    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
@@ -243,6 +245,18 @@
     additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912171"&gt;
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
@@ -251,16 +265,6 @@
     cracking the car's computer, which is always hidden and running with
     proprietary software.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -323,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary.pl.po   17 Feb 2020 08:35:26 -0000      1.163
+++ proprietary.pl.po   24 Feb 2020 17:03:37 -0000      1.164
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -540,18 +540,19 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -581,6 +582,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -588,16 +605,6 @@
 "with proprietary software."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device.  Many employers demand "
-"to do this.  For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary.pot     17 Feb 2020 08:35:26 -0000      1.160
+++ proprietary.pot     24 Feb 2020 17:03:37 -0000      1.161
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -257,18 +257,19 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a "
-"href=\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/\";>
 "
-"bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a "
+"href=\"https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\";>
 "
+"access the user's wifi password</a>, and snoop on the household through "
+"connected surveillance devices."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack "
+"this. Of course, they are also used by their manufacturers for snooping."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -299,6 +300,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a "
+"href=\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/\";>
 "
+"bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a "
 "href=\"https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html\";> "
 "record and send various kinds of data to the manufacturer</a>. For the user, "
@@ -306,16 +323,6 @@
 "computer, which is always hidden and running with proprietary software."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy\";>
 "
-"snooping and sabotage capabilities</a> if they install their own software on "
-"the device.  Many employers demand to do this.  For the employee, this is "
-"simply nonfree software, as fundamentally unjust and as dangerous as any "
-"other nonfree software."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- proprietary.pt-br.po        18 Feb 2020 10:34:02 -0000      1.273
+++ proprietary.pt-br.po        24 Feb 2020 17:03:37 -0000      1.274
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2020-02-18 06:55-0300\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -305,27 +306,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
 msgstr ""
-"Muitos aplicativos Android enganam seus usuários pedindo que eles decidam "
-"quais permissões dar ao programa e, em seguida, <a href=\"https://";
-"nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-"
-"access-sensitive-data/\"> ignorando essas permissões</a>."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
 msgstr ""
-"O sistema Android deve impedir o vazamento de dados executando aplicativos "
-"em caixas de proteção isoladas, mas os desenvolvedores encontraram maneiras 
"
-"de acessar os dados por outros meios, e não há nada que o usuário possa "
-"fazer para impedi-lo, pois o sistema e o os aplicativos são não livres."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -368,6 +362,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+"Muitos aplicativos Android enganam seus usuários pedindo que eles decidam "
+"quais permissões dar ao programa e, em seguida, <a href=\"https://";
+"nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-"
+"access-sensitive-data/\"> ignorando essas permissões</a>."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+"O sistema Android deve impedir o vazamento de dados executando aplicativos "
+"em caixas de proteção isoladas, mas os desenvolvedores encontraram maneiras 
"
+"de acessar os dados por outros meios, e não há nada que o usuário possa "
+"fazer para impedi-lo, pois o sistema e o os aplicativos são não livres."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -380,23 +398,6 @@
 "impossível, pois envolve quebrar o computador do carro, que está sempre "
 "oculto e funcionando com software proprietário."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device.  Many employers demand "
-"to do this.  For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-"Os iMonstros e os telefones Android, quando usados no trabalho, proporcionam "
-"aos empregadores poderosas <a href=\"https://www.fastcompany.com/90440073/if-";
-"you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy\"> recursos "
-"de bisbilhotamento e sabotagem</a> se eles instalarem seu próprio software "
-"no dispositivo. Muitos empregadores exigem isso. Para o funcionário, esse é 
"
-"simplesmente um software não livre, fundamentalmente injusto e perigoso como 
"
-"qualquer outro software não livre."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -472,6 +473,24 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "iMonsters and Android phones, when used for work, give employers powerful "
+#~ "<a href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-";
+#~ "phone-for-work-say-goodbye-to-your-privacy\"> snooping and sabotage "
+#~ "capabilities</a> if they install their own software on the device.  Many "
+#~ "employers demand to do this.  For the employee, this is simply nonfree "
+#~ "software, as fundamentally unjust and as dangerous as any other nonfree "
+#~ "software."
+#~ msgstr ""
+#~ "Os iMonstros e os telefones Android, quando usados no trabalho, "
+#~ "proporcionam aos empregadores poderosas <a href=\"https://www.fastcompany.";
+#~ "com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
+#~ "privacy\"> recursos de bisbilhotamento e sabotagem</a> se eles instalarem "
+#~ "seu próprio software no dispositivo. Muitos empregadores exigem isso. "
+#~ "Para o funcionário, esse é simplesmente um software não livre, "
+#~ "fundamentalmente injusto e perigoso como qualquer outro software não "
+#~ "livre."
+
+#~ msgid ""
 #~ "The Amazon Ring app does <a href=\"https://www.theguardian.com/";
 #~ "technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"
 #~ "\"> surveillance for other companies as well as for Amazon</a>."

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.336
retrieving revision 1.337
diff -u -b -r1.336 -r1.337
--- proprietary.ru.po   17 Feb 2020 09:33:21 -0000      1.336
+++ proprietary.ru.po   24 Feb 2020 17:03:38 -0000      1.337
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -311,27 +312,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
 msgstr ""
-"Многие приложения Android надувают своих 
пользователей, прося их решить, "
-"какие разрешения дать программе, а затем <a 
href=\"https://nakedsecurity.";
-"sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-"
-"sensitive-data/\"> обходя эти разрешения</a>."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
 msgstr ""
-"Предполагается, что система Android будет 
предотвращать утечку данных, "
-"выполняя приложения в изолированных 
песочницах, но разработчики нашли пути "
-"доступа к данных с помощью других средств, 
и пользователь никак не может "
-"помешать им это делать, поскольку как 
система, так и приложения несвободны."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -376,6 +370,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+"Многие приложения Android надувают своих 
пользователей, прося их решить, "
+"какие разрешения дать программе, а затем <a 
href=\"https://nakedsecurity.";
+"sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-"
+"sensitive-data/\"> обходя эти разрешения</a>."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+"Предполагается, что система Android будет 
предотвращать утечку данных, "
+"выполняя приложения в изолированных 
песочницах, но разработчики нашли пути "
+"доступа к данных с помощью других средств, 
и пользователь никак не может "
+"помешать им это делать, поскольку как 
система, так и приложения несвободны."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -388,23 +406,6 @@
 "невозможен, поскольку это сопряжено со 
взломом автомобильного компьютера, "
 "который всегда скрыт и работает под 
управлением несвободных программ."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device.  Many employers demand "
-"to do this.  For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-"Ай-чудовища и телефоны с Android, когда ими 
пользуются для работы, "
-"предоставляют работодателям мощные <a 
href=\"https://www.fastcompany.";
-"com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
-"privacy\"> возможности слежки и саботажа</a>, 
если они устанавливают свои "
-"программы на устройство. Многие 
работодатели требуют этого. Для работника "
-"это просто несвободная программа, так же 
принципиально несправедливая и "
-"опасная, как любая другая несвободная 
программа."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -483,6 +484,23 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "iMonsters and Android phones, when used for work, give employers powerful "
+#~ "<a href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-";
+#~ "phone-for-work-say-goodbye-to-your-privacy\"> snooping and sabotage "
+#~ "capabilities</a> if they install their own software on the device.  Many "
+#~ "employers demand to do this.  For the employee, this is simply nonfree "
+#~ "software, as fundamentally unjust and as dangerous as any other nonfree "
+#~ "software."
+#~ msgstr ""
+#~ "Ай-чудовища и телефоны с Android, когда ими 
пользуются для работы, "
+#~ "предоставляют работодателям мощные <a 
href=\"https://www.fastcompany.";
+#~ "com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
+#~ "privacy\"> возможности слежки и саботажа</a>, 
если они устанавливают свои "
+#~ "программы на устройство. Многие 
работодатели требуют этого. Для работника "
+#~ "это просто несвободная программа, так же 
принципиально несправедливая и "
+#~ "опасная, как любая другая несвободная 
программа."
+
+#~ msgid ""
 #~ "The Amazon Ring app does <a href=\"https://www.theguardian.com/";
 #~ "technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"
 #~ "\"> surveillance for other companies as well as for Amazon</a>."

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary.zh-tw-diff.html 17 Feb 2020 08:35:26 -0000      1.139
+++ proprietary.zh-tw-diff.html 24 Feb 2020 17:03:38 -0000      1.140
@@ -57,17 +57,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -212,16 +212,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202002020"&gt;
-    &lt;p&gt;Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then &lt;a
-    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
-    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
-    in isolated sandboxes, but developers have found ways to access the
-    data by other means, and there is nothing the user can do to stop
-    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
@@ -246,6 +248,18 @@
     additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912171"&gt;
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
@@ -254,16 +268,6 @@
     cracking the car's computer, which is always hidden and running with
     proprietary software.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -326,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary.zh-tw.po        17 Feb 2020 08:35:26 -0000      1.150
+++ proprietary.zh-tw.po        24 Feb 2020 17:03:38 -0000      1.151
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -433,18 +433,19 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -474,6 +475,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -481,16 +498,6 @@
 "with proprietary software."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device.  Many employers demand "
-"to do this.  For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- pt-br.po    21 Feb 2020 23:32:17 -0000      1.227
+++ pt-br.po    24 Feb 2020 17:03:38 -0000      1.228
@@ -1811,6 +1811,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -2906,11 +2923,12 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 #| "Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 "Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3873,17 +3891,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -8080,13 +8087,13 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
 "Foundation, Inc."
 
 #. type: Content of: <title>
@@ -8766,18 +8773,6 @@
 "continuing this practice</a>."
 msgstr ""
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -8816,6 +8811,16 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -9912,6 +9917,17 @@
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
 #~ msgid ""
 #~ "Motorola, then owned by Google, made <a href=\"http://blog.";
 #~ "azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html\"> Android "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.381
retrieving revision 1.382
diff -u -b -r1.381 -r1.382
--- ru.po       21 Feb 2020 23:32:17 -0000      1.381
+++ ru.po       24 Feb 2020 17:03:38 -0000      1.382
@@ -2119,6 +2119,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -3562,8 +3579,10 @@
 "тиранами</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -4632,12 +4651,6 @@
 "компьютере игрока, и выдает изрядное 
количество личных данных</a>, включая "
 "массу действий, никак не связанных с 
обманом."
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -9805,12 +9818,13 @@
 "среди них есть широко применяемые 
системы. Это служит подтверждением тому "
 "факту, что никогда нельзя рассчитывать на 
безопасность несвободных программ."
 
+# type: Content of: <div><p>
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 
 #. type: Content of: <title>
@@ -10530,15 +10544,6 @@
 "oracle-will-continue-to-bundle--crapware--with-java.html\"> Oracle 
упорно "
 "продолжала следовать этой практике</a>."
 
-# type: Content of: <div><p>
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
 msgstr ""
@@ -10580,6 +10585,10 @@
 "Ниже приводятся примеры подписки на 
программы, которые нанесли пользователям "
 "непосредственный вред."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr ""
@@ -11764,6 +11773,13 @@
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
 
 #~ msgid ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+
+#~ msgid ""
 #~ "Google tracks the movements of Android phones and iPhones running Goggle "
 #~ "apps, and sometimes <a href=\"https://www.nytimes.com/";
 #~ "interactive/2019/04/13/us/google-location-tracking-police.html\"> saves "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- zh-tw.po    21 Feb 2020 23:32:17 -0000      1.173
+++ zh-tw.po    24 Feb 2020 17:03:38 -0000      1.174
@@ -1638,6 +1638,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -2592,13 +2609,14 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015,-] 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; [-2013, 2014, 2015,-] 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."
@@ -3346,19 +3364,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015,-] 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Proprietary-]{+Google's+} Software {+Is Malware+} - GNU Project - Free
 # | Software Foundation
@@ -7022,14 +7027,14 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, [-2014,-] 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 2013, [-2014,-] 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
@@ -7805,20 +7810,6 @@
 "continuing this practice</a>."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2013, [-2014,-] 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
-
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Subscriptions+} - GNU Project - Free Software
 # | Foundation
@@ -7859,6 +7850,18 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015,-] 2016, 2017, [-2018-] {+2018, 2019+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
 # | Foundation
@@ -9027,6 +9030,17 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of April, 2017, the files in this directory list around 300 instances "
 #~| "of malicious functionalities, but there are surely thousands more we "
 #~| "don't know about."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]