www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sun, 7 Jun 2020 03:00:10 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/06/07 03:00:10

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.es.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po nl.po pl.po pot 
                         proprietary-tethers.de-diff.html 
                         proprietary-tethers.de.po 
                         proprietary-tethers.es.po 
                         proprietary-tethers.fr.po 
                         proprietary-tethers.ja-diff.html 
                         proprietary-tethers.ja.po 
                         proprietary-tethers.pot 
                         proprietary-tethers.pt-br.po 
                         proprietary-tethers.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.es.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.269&r2=1.270
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.317&r2=1.318
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.293&r2=1.294
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.351&r2=1.352
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.242&r2=1.243
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.404&r2=1.405
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.182&r2=1.183

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- de.po       1 Jun 2020 11:00:33 -0000       1.182
+++ de.po       7 Jun 2020 07:00:04 -0000       1.183
@@ -2579,6 +2579,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- es.po       1 Jun 2020 11:00:33 -0000       1.261
+++ es.po       7 Jun 2020 07:00:04 -0000       1.262
@@ -2457,6 +2457,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- fr.po       1 Jun 2020 11:17:21 -0000       1.319
+++ fr.po       7 Jun 2020 07:00:04 -0000       1.320
@@ -2125,6 +2125,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- it.po       1 Jun 2020 11:00:33 -0000       1.182
+++ it.po       7 Jun 2020 07:00:04 -0000       1.183
@@ -2518,6 +2518,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- ja.po       1 Jun 2020 11:00:33 -0000       1.190
+++ ja.po       7 Jun 2020 07:00:04 -0000       1.191
@@ -1925,6 +1925,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-appliances.de-diff.html     25 Mar 2020 10:33:58 -0000      1.53
+++ malware-appliances.de-diff.html     7 Jun 2020 07:00:04 -0000       1.54
@@ -78,529 +78,632 @@
 &lt;ul&gt;
   &lt;li id="nest-thermometers"&gt;
     &lt;p&gt;Nest thermometers
-      send</strong></del></span> <span class="inserted"><ins><em>this page but 
isn't
-here, please write
-to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-      lot of data about</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
+      send &lt;a 
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+      lot of data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or 
two</em></ins></span>
-to <span class="removed"><del><strong>make</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
+    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>this page but isn't
+here, please write</em></ins></span>
+to <span class="removed"><del><strong>make</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>conversation between</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span> 
two <span class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
+      is</strong></del></span>
+<span class="inserted"><ins><em>to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="malware-appliances"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201912170"&gt;
-    &lt;p&gt;Some security breakers (wrongly referred in this article 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
-    managed to interfere</em></ins></span> the <span 
class="removed"><del><strong>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M202005070"&gt;
+    &lt;p&gt;Wink sells</em></ins></span> a <span 
class="removed"><del><strong>surveillance device. &lt;a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on 
the fact</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; home hub</em></ins></span> that 
<span class="removed"><del><strong>the device</strong></del></span> is tethered
+    to a <span class="removed"><del><strong>server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>server. 
In May 2020,</em></ins></span> it <span class="removed"><del><strong>also 
demonstrates</strong></del></span> <span class="inserted"><ins><em>ordered the 
purchasers to start &lt;a
+    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
+    paying a monthly fee for the use of</em></ins></span> that <span 
class="inserted"><ins><em>server&lt;/a&gt;.  Because of</em></ins></span> the 
<span class="removed"><del><strong>device gives</strong></del></span>
+    <span class="inserted"><ins><em>tethering,</em></ins></span> the <span 
class="removed"><del><strong>company
+      surveillance capability.&lt;/p&gt;
+&lt;/li&gt;
+  
+&lt;li&gt;
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
+    hospitals</strong></del></span> <span 
class="inserted"><ins><em>hub</em></ins></span> is <span 
class="removed"><del><strong>connected</strong></del></span> <span 
class="inserted"><ins><em>useless without that.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, 
if</strong></del></span> <span class="inserted"><ins><em>Amazon Ring 
proprietary system, and &lt;a
-    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access</em></ins></span>
-    its <span class="removed"><del><strong>manufacturer can communicate with 
it,
-      is</strong></del></span> <span class="inserted"><ins><em>camera, 
speakers and microphones&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201912170"&gt;
+    &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
+    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
+    managed</em></ins></span> to <span 
class="inserted"><ins><em>interfere</em></ins></span> the <span 
class="removed"><del><strong>internet. Naturally</strong></del></span> <span 
class="inserted"><ins><em>Amazon Ring proprietary system, and</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access</em></ins></span>
+    its <span class="inserted"><ins><em>camera, speakers and 
microphones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had</em></ins></span>
-    a <span class="removed"><del><strong>surveillance 
device.</strong></del></span> <span class="inserted"><ins><em>security 
vulnerability that enabled attackers to</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a</em></ins></span> security <span class="removed"><del><strong>has been 
cracked&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>vulnerability</em></ins></span> that <span 
class="removed"><del><strong>this article misuses the 
term</strong></del></span> <span class="inserted"><ins><em>enabled attackers 
to</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
+     referring</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based</strong></del></span> <span 
class="inserted"><ins><em>user's wifi password&lt;/a&gt;, and 
snoop</em></ins></span> on the <span class="removed"><del><strong>fact
-      that</strong></del></span> <span class="inserted"><ins><em>household
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge of</em></ins></span> the <span 
class="removed"><del><strong>device is tethered</strong></del></span> <span 
class="inserted"><ins><em>wifi password would not be 
sufficient</em></ins></span> to <span class="removed"><del><strong>a 
server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More 
about</strong></del></span> <span class="inserted"><ins><em>carry
+    &lt;p&gt;Knowledge of the wifi password would not be 
sufficient</em></ins></span> to <span 
class="removed"><del><strong>crackers.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;The bad security in</strong></del></span> <span 
class="inserted"><ins><em>carry
     out any significant surveillance if the devices implemented proper
-    security, including encryption. But many devices with</em></ins></span> 
proprietary <span class="removed"><del><strong>tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it</strong></del></span>
-    <span class="inserted"><ins><em>software lack this. Of course, they 
are</em></ins></span> also <span class="removed"><del><strong>demonstrates 
that</strong></del></span> <span class="inserted"><ins><em>used by their
+    security, including encryption. But</em></ins></span> many <span 
class="removed"><del><strong>Internet of Stings</strong></del></span> devices
+    <span class="removed"><del><strong>allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
 <span class="inserted"><ins><em>with proprietary
+    software lack this. Of course, they are also used by their
     manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were tethered to</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>manufacturer's server,
+    &lt;p&gt;The Jibo robot toys were tethered</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> the <span 
class="removed"><del><strong>people that use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be a sucker&mdash;reject all</strong></del></span> <span 
class="inserted"><ins><em>manufacturer's server,
     and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;</em></ins></span>
-    the company
-      <span class="removed"><del><strong>surveillance capability.&lt;/p&gt;
+    the <span class="removed"><del><strong>stings.&lt;/p&gt;
+  &lt;p&gt;It is unfortunate</strong></del></span> <span 
class="inserted"><ins><em>company made them all cease to work&lt;/a&gt; by 
shutting down</em></ins></span> that
+    <span class="inserted"><ins><em>server.&lt;/p&gt;
+
+    &lt;p&gt;The shutdown might ironically be good for their users, 
since</em></ins></span> the <span class="removed"><del><strong>article uses the
+  term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
   
 &lt;li&gt;
-  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
-    hospitals is connected</strong></del></span> <span 
class="inserted"><ins><em>made them all cease</em></ins></span> to <span 
class="removed"><del><strong>the internet. Naturally &lt;a
-href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
-    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt; by shutting down</em></ins></span> 
that <span class="removed"><del><strong>this article 
misuses</strong></del></span>
-    <span class="inserted"><ins><em>server.&lt;/p&gt;
-
-    &lt;p&gt;The shutdown might ironically be good for their users, 
since</em></ins></span> the <span class="removed"><del><strong>term &lt;a
-href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-     referring</strong></del></span>
-    <span class="inserted"><ins><em>product was designed</em></ins></span> to 
<span class="removed"><del><strong>crackers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>manipulate people by presenting a phony
-    semblance of emotions, and was most certainly spying on 
them.&lt;/p&gt;</em></ins></span>
+  &lt;p&gt;Many models</strong></del></span>
+    <span class="inserted"><ins><em>product was designed to manipulate people 
by presenting a phony
+    semblance</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras are tremendously 
insecure.
+  They have login accounts with hard-coded passwords, which can't be
+  changed,</strong></del></span> <span 
class="inserted"><ins><em>emotions,</em></ins></span> and <span 
class="removed"><del><strong>&lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way to
+  delete these accounts either&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>was most certainly spying on 
them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>bad security in many 
Internet</strong></del></span> <span class="inserted"><ins><em>Medtronics 
Conexus Telemetry Protocol has &lt;a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models</em></ins></span> of <span 
class="removed"><del><strong>Stings</strong></del></span> <span 
class="inserted"><ins><em>implantable
-    defibrillators&lt;/a&gt; and the</em></ins></span> devices
-    <span class="removed"><del><strong>allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
 <span class="inserted"><ins><em>they connect to.&lt;/p&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>proprietary code that runs 
pacemakers, insulin pumps, and other
+medical devices is</strong></del></span> <span 
class="inserted"><ins><em>Medtronics Conexus Telemetry Protocol 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models</em></ins></span> of <span 
class="removed"><del><strong>gross security faults&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users are suing Bose for &lt;a
+href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing a spyware app for its headphones&lt;/a&gt;.
+Specifically, the app would record</strong></del></span> <span 
class="inserted"><ins><em>implantable
+    defibrillators&lt;/a&gt; and</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>devices they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
     vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the 
company</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span>
-    <span class="inserted"><ins><em>correct them. This means you can't 
rely</em></ins></span> on <span class="removed"><del><strong>the people that 
use them&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
-  &lt;p&gt;It</strong></del></span> <span 
class="inserted"><ins><em>proprietary software
+    protocol in 2008. Apparently, nothing was done by</em></ins></span> the 
<span class="removed"><del><strong>audio files
+users listen</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
+&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>correct them. This means you can't rely on 
proprietary software
     developers to fix bugs in their products.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera</em></ins></span> is <span 
class="removed"><del><strong>unfortunate</strong></del></span> <span 
class="inserted"><ins><em>designed so</em></ins></span> that the <span 
class="removed"><del><strong>article uses</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch 
all</em></ins></span> the
-  <span class="removed"><del><strong>term</strong></del></span> <span 
class="inserted"><ins><em>time. Now it turns out
-    that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Many models of Internet-connected cameras are tremendously insecure.
-  They have login accounts with hard-coded passwords, which can't be
-  changed,</strong></del></span>
+  &lt;li id="M201902270"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>suit 
accuses</strong></del></span> <span class="inserted"><ins><em>Ring (now Amazon) 
doorbell camera is designed so</em></ins></span> that <span 
class="removed"><del><strong>this was done without the users' consent.
+If</strong></del></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch 
all</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>time. 
Now</em></ins></span> it <span class="removed"><del><strong>acceptable? No way! 
It should be flat</strong></del></span> <span 
class="inserted"><ins><em>turns</em></ins></span> out
+    <span class="inserted"><ins><em>that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal to design the app</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
-    anyone else can also watch,</em></ins></span> and <span 
class="removed"><del><strong>&lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there</strong></del></span>
 <span class="inserted"><ins><em>fake videos too&lt;/a&gt;.&lt;/p&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The third party vulnerability</em></ins></span> is <span 
class="removed"><del><strong>no way</strong></del></span> <span 
class="inserted"><ins><em>presumably
+    &lt;p&gt;The third party vulnerability is presumably
     unintentional and Amazon will probably fix it. However, we
-    do not expect Amazon</em></ins></span> to
-  <span class="removed"><del><strong>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;
+    do not expect Amazon</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;The proprietary code</strong></del></span> <span 
class="inserted"><ins><em>change the design</em></ins></span> that <span 
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
-medical devices is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+&lt;li id="anova"&gt;
+  &lt;p&gt;Anova sabotaged users' cooking devices with a 
downgrade</strong></del></span> <span class="inserted"><ins><em>change the 
design</em></ins></span> that
+  <span class="removed"><del><strong>tethered them to a remote 
server.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
+  cookers won't function.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing Bose 
for</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher 
is</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing a spyware app</strong></del></span>
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying</em></ins></span> for <span class="removed"><del><strong>its 
headphones&lt;/a&gt;.
-Specifically,</strong></del></span> the <span class="removed"><del><strong>app 
would record</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="inserted"><ins><em>make sure</em></ins></span> the <span 
class="removed"><del><strong>Internet,
+its security</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;For example, a cracker can gain access to</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>dishwasher's filesystem,
+ infect it with malware,</strong></del></span> <span 
class="inserted"><ins><em>subscription,</em></ins></span> and <span 
class="removed"><del><strong>force</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="inserted"><ins><em>ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>dishwasher to launch attacks</strong></del></span> 
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
+    specific cases, it spies</em></ins></span> on
+ <span class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
+    restrictions</em></ins></span> in the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
+ such attacks could potentially put hundreds</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> of <span 
class="removed"><del><strong>lives at risk.&lt;/p&gt;
+
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
+etc.,
+usually &lt;a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
+previous owners can still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span>
 
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="removed"><del><strong>along 
with</strong></del></span> <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save it
+  <span class="inserted"><ins><em>&lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+      report everything that is viewed on them, and not just broadcasts
+      and cable&lt;/a&gt;. Even if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send</em></ins></span> the <span class="removed"><del><strong>image is 
coming from</strong></del></span> <span class="inserted"><ins><em>video they 
capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
-&lt;/p&gt;
-
-&lt;p&gt;The suit accuses</strong></del></span> <span 
class="inserted"><ins><em>video shows everyone</em></ins></span> that <span 
class="removed"><del><strong>this was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>comes near, or merely
-    passes by,</em></ins></span> the <span class="removed"><del><strong>fine 
print of</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by,</em></ins></span> the user's <span 
class="removed"><del><strong>own
+    computer,</strong></del></span> <span class="inserted"><ins><em>front 
door.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
-would that make it acceptable? No way!</strong></del></span> <span 
class="inserted"><ins><em>videos freely.</em></ins></span>  It <span 
class="removed"><del><strong>should be flat out
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span> <span class="inserted"><ins><em>appears Amazon 
has tried</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>prevent that
-    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>surrender 
to.&lt;/p&gt;</em></ins></span>
+    at</em></ins></span> the <span class="removed"><del><strong>TV reports 
what it is. The existence of a way</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has 
tried</em></ins></span> to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>prevent that
+    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon 
gets</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>video&mdash;Amazon expects society to 
surrender to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;More or less all &ldquo;smart&rdquo;</strong></del></span>
 
-  &lt;li <span class="removed"><del><strong>id="anova"&gt;
-  &lt;p&gt;Anova sabotaged users' cooking devices with a downgrade that
-  tethered them to a remote server.</strong></del></span> <span 
class="inserted"><ins><em>id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
-  cookers won't function.&lt;/a&gt;&lt;/p&gt;
-&lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
+    &lt;p&gt;Vizio</em></ins></span> TVs &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;When Miele's Internet</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own 
words</em></ins></span> of <span class="removed"><del><strong>Stings hospital 
disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> the <span class="removed"><del><strong>Internet,
-its security</strong></del></span> <span class="inserted"><ins><em>company's
-    CTO, and this data</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;For example, a cracker can gain access</strong></del></span> <span 
class="inserted"><ins><em>sold</em></ins></span> to <span 
class="removed"><del><strong>the dishwasher's filesystem,
- infect it with malware,</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>force the 
dishwasher</strong></del></span> <span class="inserted"><ins><em>slightly
-    lower retail prices.&lt;/p&gt;
+&lt;p&gt;The report was as of 2014, but we don't expect this has got
+better.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on
- other devices</strong></del></span> <span class="inserted"><ins><em>make this 
spying acceptable, according to him,
-    is that it is opt-in</em></ins></span> in <span 
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
- such attacks could potentially put hundreds of lives at risk.&lt;/p&gt;
+&lt;p&gt;This shows that laws requiring products to get users' formal
+consent before collecting personal data are totally inadequate.  And
+what happens if a user declines consent?  Probably the TV will say,
+&ldquo;Without your consent to tracking,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever</em></ins></span> the TV <span 
class="removed"><del><strong>will not
+work.&rdquo;&lt;/p&gt;
 
+&lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span 
class="inserted"><ins><em>sees,&rdquo;&lt;/a&gt; in</em></ins></span> the
+<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;Some LG
+TVs &lt;a href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
+tyrants&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>Vizio 
software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;If you <span 
class="removed"><del><strong>buy</strong></del></span> <span 
class="inserted"><ins><em>already own</em></ins></span> a <span 
class="removed"><del><strong>used &ldquo;smart&rdquo; car, 
house,</strong></del></span> <span class="inserted"><ins><em>Vizio smart TV (or 
any smart</em></ins></span> TV, <span class="removed"><del><strong>refrigerator,
-etc.,
-usually &lt;a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
-previous owners can still remotely control it&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;a
+href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
+Samsung &ldquo;Smart&rdquo; TVs have turned Linux into</strong></del></span> 
<span class="inserted"><ins><em>own words of</em></ins></span> the <span 
class="removed"><del><strong>base
+for a tyrant system&lt;/a&gt; so as</strong></del></span> <span 
class="inserted"><ins><em>company's
+    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>impose DRM.
+What enables Samsung</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    lower retail prices.&lt;/p&gt;
+
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>do</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> this <span 
class="inserted"><ins><em>spying acceptable, according to him,</em></ins></span>
+    is that <span class="removed"><del><strong>Linux</strong></del></span> 
<span class="inserted"><ins><em>it</em></ins></span> is <span 
class="removed"><del><strong>released under
+GNU GPL version 2, &lt;a href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
+together with a weak interpretation of GPL version 2.
 &lt;/li&gt;
+
 &lt;li&gt;
-  &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-      report everything</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> that <span 
class="removed"><del><strong>is viewed</strong></del></span>
-    <span class="inserted"><ins><em>matter), the easiest way to make sure it 
isn't spying</em></ins></span> on <span 
class="removed"><del><strong>them,</strong></del></span> <span 
class="inserted"><ins><em>you is
-    to disconnect it from the Internet,</em></ins></span> and <span 
class="inserted"><ins><em>use a terrestrial antenna
-    instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>just broadcasts
-      and cable&lt;/a&gt;. Even</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,</em></ins></span>
-    if <span class="removed"><del><strong>the image</strong></del></span> 
<span class="inserted"><ins><em>you are technically oriented,</em></ins></span> 
is <span class="removed"><del><strong>coming from the 
user's</strong></del></span> <span class="inserted"><ins><em>to get 
your</em></ins></span> own
-    <span class="removed"><del><strong>computer, the TV reports what it is. 
The existence of</strong></del></span> <span class="inserted"><ins><em>router 
(which can
-    be an old computer running completely free software), and set 
up</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span>
-    <span class="inserted"><ins><em>firewall</em></ins></span> to
-    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden</strong></del></span> <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or,</em></ins></span> as <span 
class="removed"><del><strong>it was in
-    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
last resort,
-    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>opt-in in newer models. But since the Vizio software 
is
+    nonfree, we don't know what is actually happening behind the scenes,
+    and there is no guarantee</em></ins></span> that <span 
class="removed"><del><strong>makes internet-controlled vibrators
+&lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+being sued</strong></del></span> <span class="inserted"><ins><em>all future 
updates will leave the
+    settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own a Vizio smart TV (or any smart 
TV,</em></ins></span> for <span class="removed"><del><strong>collecting lots of 
personal information about how
+people use it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;The company's statement</strong></del></span> that <span 
class="removed"><del><strong>it anonymizes</strong></del></span>
+    <span class="inserted"><ins><em>matter),</em></ins></span> the <span 
class="removed"><del><strong>data may be true,
+but</strong></del></span> <span class="inserted"><ins><em>easiest way to make 
sure</em></ins></span> it <span class="removed"><del><strong>doesn't really 
matter. If</strong></del></span> <span class="inserted"><ins><em>isn't spying 
on you is
+    to disconnect</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
+    instead. Unfortunately, this is not always possible. Another option,
+    if you are technically oriented, is</em></ins></span> to <span 
class="inserted"><ins><em>get your own router (which can
+    be an old computer running completely free software), and set 
up</em></ins></span> a <span class="removed"><del><strong>data broker,
+the data broker</strong></del></span>
+    <span class="inserted"><ins><em>firewall to block connections to Vizio's 
servers. Or, as a last resort,
+    you</em></ins></span> can <span class="removed"><del><strong>figure out 
who the user is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>replace your TV with another 
model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;More or less</strong></del></span>
+&lt;p&gt;Google/Alphabet</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly</em></ins></span> all <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;home security 
cameras&rdquo;</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
+intentionally broke Revolv home automatic control products that depended on
+a server&lt;/a&gt; to function.  The lesson is, don't stand for that! Insist
+on self-contained computers that run free software!&lt;/p&gt;
+&lt;/li&gt;
 
-&lt;p&gt;The report was as</strong></del></span>
+&lt;li&gt;
+&lt;p&gt;ARRIS cable modem has</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got
-better.&lt;/p&gt;
-
-&lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>&lt;a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+backdoor</strong></del></span> <span class="inserted"><ins><em>better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span class="inserted"><ins><em>these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
-consent before collecting personal data are totally inadequate.  And
-what happens if a user declines consent?  Probably</strong></del></span> <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>TV will say,
-&ldquo;Without</strong></del></span> <span class="inserted"><ins><em>videos. 
That's not
-    security for</em></ins></span> your <span 
class="removed"><del><strong>consent</strong></del></span> <span 
class="inserted"><ins><em>home. Security means making sure they don't 
get</em></ins></span> to <span class="removed"><del><strong>tracking, the TV 
will not
-work.&rdquo;&lt;/p&gt;
-
-&lt;p&gt;Proper laws would say that TVs</strong></del></span>
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's</em></ins></span> in the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>videos. That's not
+    security for your home. Security means making sure they don't get to
+    see through your camera.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers</em></ins></span> are <span 
class="removed"><del><strong>not allowed to report what</strong></del></span> 
<span class="inserted"><ins><em>very innovative&mdash;at 
blocking</em></ins></span> the
-<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;Some LG
-TVs</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at 
blocking</em></ins></span> the <span class="removed"><del><strong>proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors that give 
HP</strong></del></span>
     <span class="inserted"><ins><em>use of independent replacement ink 
cartridges. Their &ldquo;security
-    upgrades&rdquo; occasionally impose new forms of cartridge 
DRM.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
-tyrants&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
-    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    upgrades&rdquo; occasionally impose new forms of cartridge 
DRM.</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does not 
give</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;</em></ins></span>
+    HP
+<span class="removed"><del><strong>access to</strong></del></span> <span 
class="inserted"><ins><em>and Epson have done this&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
-Samsung &ldquo;Smart&rdquo; TVs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201809260"&gt;
+  &lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through the company's server. They</em></ins></span> have <span 
class="removed"><del><strong>turned Linux into</strong></del></span>
-    <span class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>base
-for a tyrant system&lt;/a&gt; so as to impose DRM.
-What enables Samsung to do this is that Linux is released under
-GNU GPL version 2,</strong></del></span> <span class="inserted"><ins><em>nasty 
characteristics of such devices:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
-together with</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of</em></ins></span> a 
<span class="removed"><del><strong>weak interpretation</strong></del></span> 
<span class="inserted"><ins><em>specific user, or</em></ins></span> of <span 
class="removed"><del><strong>GPL version 2.
+    only through</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>company's server. They have
+    all</em></ins></span> the <span class="removed"><del><strong>back door 
allows
+installation</strong></del></span> <span class="inserted"><ins><em>nasty 
characteristics</em></ins></span> of <span 
class="removed"><del><strong>software changes,</strong></del></span> <span 
class="inserted"><ins><em>such devices: &lt;a
+    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
+    surveillance, and danger of sabotage&lt;/a&gt; (of</em></ins></span> a 
<span class="removed"><del><strong>change could be installed that
+would give access to</strong></del></span> <span 
class="inserted"><ins><em>specific user, or of
+    all users at once), as well as</em></ins></span> the <span 
class="removed"><del><strong>customer's data.
+&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;A company that makes internet-controlled vibrators
-&lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-being sued for collecting lots</strong></del></span>
-    <span class="inserted"><ins><em>all users at once), as well as the 
risk</em></ins></span> of <span class="removed"><del><strong>personal 
information about how
-people use it&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;&lt;a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
+dlink</strong></del></span> <span 
class="inserted"><ins><em>risk</em></ins></span> of an <span 
class="removed"><del><strong>eye.&lt;/p&gt;
 
-&lt;p&gt;The company's statement that it anonymizes</strong></del></span> 
<span class="inserted"><ins><em>an outage (which is what
+&lt;p&gt;
+&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of routers
+have back doors&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outage (which is what
     just happened).&lt;/p&gt;
 
-    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>data may be true,
-but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can 
do</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span>
-    <span class="inserted"><ins><em>using controls right on</em></ins></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>thermostat.&lt;/p&gt;
+    &lt;p&gt;In addition, setting the desired temperature requires running
+    nonfree software. With an old-fashioned thermostat, you can do it
+    using controls right on the thermostat.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201809240"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
     hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
+    them, but Alexa and Siri can.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807050"&gt;
-    &lt;p&gt;The Jawbone fitness tracker was tethered</em></ins></span> to a 
<span class="removed"><del><strong>data broker,</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone
-    app.  In 2017,</em></ins></span> the <span 
class="removed"><del><strong>data broker can figure out 
who</strong></del></span> <span class="inserted"><ins><em>company shut down and 
made</em></ins></span> the <span class="removed"><del><strong>user is.&lt;/p&gt;
-&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-&lt;li&gt;
-&lt;p&gt;Google/Alphabet</strong></del></span> <span 
class="inserted"><ins><em>app stop working.</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
-intentionally broke Revolv home automatic control products that 
depended</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
-    the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses</em></ins></span> on a <span 
class="removed"><del><strong>server&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>further nasty fillip, that sales of the
-    broken devices continued. But we think that is a secondary issue;
-    it made the nasty consequences extend</em></ins></span> to <span 
class="removed"><del><strong>function.</strong></del></span> <span 
class="inserted"><ins><em>some additional people.</em></ins></span>
-    The <span class="removed"><del><strong>lesson is, don't stand for that! 
Insist</strong></del></span> <span class="inserted"><ins><em>fundamental wrong 
was to design the devices to depend</em></ins></span> on <span 
class="removed"><del><strong>self-contained computers</strong></del></span> 
<span class="inserted"><ins><em>something
-    else</em></ins></span> that <span class="removed"><del><strong>run free 
software!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>didn't respect users' 
freedom.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201807050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+&ldquo;Cube&rdquo; 3D printer</strong></del></span> <span 
class="inserted"><ins><em>Jawbone fitness tracker</em></ins></span> was <span 
class="removed"><del><strong>designed with DRM&lt;/a&gt;: it won't accept
+third-party printing materials.  It is</strong></del></span> <span 
class="inserted"><ins><em>tethered to a proprietary phone
+    app.  In 2017,</em></ins></span> the <span 
class="removed"><del><strong>Keurig of printers.  Now it is
+being discontinued, which means that eventually authorized materials won't
+be available</strong></del></span> <span class="inserted"><ins><em>company 
shut down</em></ins></span> and <span 
class="inserted"><ins><em>made</em></ins></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
+
+&lt;p&gt;With a</strong></del></span> <span class="inserted"><ins><em>app stop 
working.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer that gets</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All</em></ins></span>
+    the <span class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, 
this problem would not
+even be</strong></del></span> <span class="inserted"><ins><em>existing 
trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on</em></ins></span> a <span 
class="removed"><del><strong>remote possibility.&lt;/p&gt;
+
+&lt;p&gt;How pitiful</strong></del></span> <span 
class="inserted"><ins><em>further nasty fillip,</em></ins></span> that <span 
class="removed"><del><strong>the author</strong></del></span> <span 
class="inserted"><ins><em>sales</em></ins></span> of <span 
class="inserted"><ins><em>the
+    broken devices continued. But we think</em></ins></span> that <span 
class="removed"><del><strong>article says that there was
+&ldquo;nothing wrong&rdquo; with designing</strong></del></span> <span 
class="inserted"><ins><em>is a secondary issue;
+    it made</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>nasty consequences extend</em></ins></span> to <span 
class="removed"><del><strong>restrict users in</strong></del></span> <span 
class="inserted"><ins><em>some additional people.
+    The fundamental wrong was to design</em></ins></span> the <span 
class="removed"><del><strong>first place.  This is like 
putting</strong></del></span> <span class="inserted"><ins><em>devices to depend 
on something
+    else that didn't respect users' freedom.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company &lt;a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers</em></ins></span> a <span class="removed"><del><strong>&ldquo;cheat 
me and mistreat me&rdquo;
+sign</strong></del></span> <span class="inserted"><ins><em>gratis electronic 
toothbrush that snoops</em></ins></span> on <span 
class="removed"><del><strong>your chest.  We should know better: we should 
condemn all companies</strong></del></span> <span class="inserted"><ins><em>its 
user by
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;ARRIS cable modem has a</strong></del></span>
+  &lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>take advantage of people like him.  
Indeed,</strong></del></span> <span class="inserted"><ins><em>install a 
surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-backdoor in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;We link to the article for the facts</em></ins></span> it <span 
class="inserted"><ins><em>presents. It</em></ins></span>
+    is <span class="inserted"><ins><em>too bad that</em></ins></span> the 
<span class="removed"><del><strong>acceptance</strong></del></span> <span 
class="inserted"><ins><em>article finishes by advocating the
+    moral weakness</em></ins></span> of
+<span class="removed"><del><strong>their unjust practice that teaches 
people</strong></del></span> <span 
class="inserted"><ins><em>surrendering</em></ins></span> to <span 
class="removed"><del><strong>be doormats.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs</strong></del></span>
 
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors</strong></del></span> 
<span class="inserted"><ins><em>article for the facts it presents. It
-    is too bad</em></ins></span> that <span class="removed"><del><strong>give 
HP</strong></del></span> <span class="inserted"><ins><em>the article finishes 
by advocating the
-    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
-remote login access&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock users in</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
+have been</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely to Apple services&lt;/a&gt; by being</em></ins></span> designed 
<span class="removed"><del><strong>not</strong></del></span> to <span 
class="removed"><del><strong>interact</strong></del></span> <span 
class="inserted"><ins><em>be incompatible</em></ins></span>
+    with <span class="inserted"><ins><em>all</em></ins></span> other <span 
class="removed"><del><strong>companies' smart
+lightbulbs&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock users in &lt;a
-    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely</em></ins></span> to <span class="removed"><del><strong>them.  HP 
claims that this does not give HP
-access</strong></del></span> <span class="inserted"><ins><em>Apple 
services&lt;/a&gt; by being designed</em></ins></span> to <span 
class="inserted"><ins><em>be incompatible
-    with all other options, ethical or unethical.&lt;/p&gt;
+&lt;p&gt;If a product</strong></del></span> <span 
class="inserted"><ins><em>options, ethical or unethical.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712240"&gt;
-    &lt;p&gt;One of</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>dangers of</em></ins></span> the <span 
class="removed"><del><strong>back door allows
-installation</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;internet</em></ins></span> of <span 
class="removed"><del><strong>software changes,</strong></del></span> <span 
class="inserted"><ins><em>stings&rdquo;
-    is that, if you lose your internet service, you also &lt;a
-    
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;For your safety, don't use any appliance with</em></ins></span> a 
<span class="removed"><del><strong>change could be installed that
-would give access</strong></del></span> <span 
class="inserted"><ins><em>connection</em></ins></span> to the <span 
class="removed"><del><strong>customer's data.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>real internet.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;One of the dangers of the &ldquo;internet of 
stings&rdquo;</em></ins></span>
+    is <span class="removed"><del><strong>&ldquo;smart&rdquo;, 
and</strong></del></span> <span class="inserted"><ins><em>that, 
if</em></ins></span> you <span class="removed"><del><strong>didn't build it, it 
is
+cleverly serving its manufacturer &lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;&lt;a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-Some D-Link routers&lt;/a&gt; have</strong></del></span>
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
+DVDs and Bluray disks have DRM&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;That page uses spin terms that favor DRM,
+including &lt;a 
href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+digital &ldquo;rights&rdquo; management&lt;/a&gt;
+and</strong></del></span> <span class="inserted"><ins><em>lose your internet 
service, you also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
+    lose control of your house</em></ins></span> and <span 
class="removed"><del><strong>it claims that &ldquo;artists&rdquo; (rather than 
companies) are
+primarily responsible for putting digital restrictions management into
+these disks.  Nonetheless, it is a reference for the facts.
+&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
-    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system has</em></ins></span> a <span 
class="removed"><del><strong>back door for changing settings in a
-dlink of an eye.&lt;/p&gt;
+&lt;p&gt;Every Bluray disk (with few, rare exceptions) has 
DRM&mdash;so</strong></del></span> <span 
class="inserted"><ins><em>appliances&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>grave security 
flaw.&lt;/p&gt;
+    &lt;p&gt;For your safety,</em></ins></span> don't use <span 
class="removed"><del><strong>Bluray disks!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>any appliance with a connection to the
+    real internet.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764"&gt;Many
 models</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings</em></ins></span> of <span class="removed"><del><strong>routers
-have back doors&lt;/a&gt;.&lt;/p&gt;
+  &lt;li <span class="removed"><del><strong>id="cameras-bugs"&gt;
+&lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</strong></del></span> <span class="inserted"><ins><em>id="M201711200"&gt;
+    &lt;p&gt;Amazon recently invited consumers to be suckers 
and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+security bugs that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;</em></ins></span>
+    allow <span class="removed"><del><strong>anyone</strong></del></span> 
<span class="inserted"><ins><em>delivery staff</em></ins></span> to <span 
class="removed"><del><strong>watch through them&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
-The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>open their front doors&lt;/a&gt;. Wouldn't you know
+    it, the system</em></ins></span> has a <span 
class="removed"><del><strong>big</strong></del></span> <span 
class="inserted"><ins><em>grave</em></ins></span> security <span 
class="removed"><del><strong>hole;</strong></del></span> <span 
class="inserted"><ins><em>flaw.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The</strong></del></span>
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized people can remotely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711080"&gt;
+  &lt;li id="M201711080"&gt;
     &lt;p&gt;Logitech will sabotage
-    all Harmony Link household control devices by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
-&ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it won't accept
-third-party printing materials.  It is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
-    turning off</em></ins></span> the <span 
class="removed"><del><strong>Keurig of printers.  Now it is
-being discontinued,</strong></del></span> <span 
class="inserted"><ins><em>server through</em></ins></span> which <span 
class="removed"><del><strong>means that eventually authorized materials won't
-be available and the printers may become unusable.&lt;/p&gt;
+    all Harmony Link household</em></ins></span> control <span 
class="removed"><del><strong>it&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;With a &lt;a 
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer that gets</strong></del></span> the <span 
class="removed"><del><strong>Respects Your 
Freedom&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>products' supposed owners
+&lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform 
so</strong></del></span> <span class="inserted"><ins><em>devices by &lt;a
+    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
+    turning off</em></ins></span> the
+<span class="removed"><del><strong>problem is partly</strong></del></span> 
<span class="inserted"><ins><em>server through which</em></ins></span> the 
<span class="removed"><del><strong>fault of app developers. 
That</strong></del></span> <span class="inserted"><ins><em>products' supposed 
owners
     communicate with them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The owners suspect</em></ins></span> this <span 
class="removed"><del><strong>problem would not
-even be</strong></del></span> <span class="inserted"><ins><em>is to pressure 
them to buy</em></ins></span> a <span class="removed"><del><strong>remote 
possibility.&lt;/p&gt;
-
-&lt;p&gt;How pitiful that the author of</strong></del></span> <span 
class="inserted"><ins><em>newer model. If
-    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that
-    <span class="inserted"><ins><em>requires users to talk with them through 
some specialized service.&lt;/p&gt;
+    &lt;p&gt;The owners suspect this</em></ins></span> is <span 
class="removed"><del><strong>clearly true if
+the apps</strong></del></span> <span class="inserted"><ins><em>to pressure 
them to buy a newer model. If
+    they</em></ins></span> are <span class="removed"><del><strong>proprietary 
software.&lt;/p&gt;
+
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely 
going</strong></del></span> <span class="inserted"><ins><em>wise, they will 
learn, rather,</em></ins></span> to
+<span class="removed"><del><strong>screw you.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>distrust any product that
+    requires users to talk with them through some specialized 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201710040"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;
+Malware found on</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201710040"&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate with it, is a surveillance device. &lt;a
-    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-    Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    manufacturer can communicate with it, is a surveillance 
device.</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+security cameras available through Amazon&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;A</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+    Canary</em></ins></span> camera <span class="removed"><del><strong>that 
records locally on physical media, and has no network
+connection, does not threaten people with 
surveillance&mdash;neither</strong></del></span> <span 
class="inserted"><ins><em>is an example&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article describes wrongdoing</em></ins></span> by <span 
class="removed"><del><strong>watching people through</strong></del></span> the 
<span class="removed"><del><strong>camera, nor through malware 
in</strong></del></span> <span class="inserted"><ins><em>manufacturer, based 
on</em></ins></span>
+    the
+<span class="removed"><del><strong>camera.&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>says</strong></del></span> <span 
class="inserted"><ins><em>describes wrongdoing by the manufacturer, based on
-    the fact</em></ins></span> that <span class="removed"><del><strong>there 
was
-&ldquo;nothing wrong&rdquo; with designing</strong></del></span> the device 
<span class="removed"><del><strong>to restrict users in
-the first place.  This</strong></del></span> is <span 
class="removed"><del><strong>like putting</strong></del></span> <span 
class="inserted"><ins><em>tethered to</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;cheat me and mistreat me&rdquo;
-sign on your chest.  We should know better: we should condemn all companies
-that take advantage of people like him.  Indeed,</strong></del></span> <span 
class="inserted"><ins><em>server.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt; &lt;a
+href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+FitBit fitness trackers have a Bluetooth 
vulnerability&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>fact</em></ins></span> that <span 
class="removed"><del><strong>allows
+attackers to send malware to</strong></del></span> the <span 
class="removed"><del><strong>devices, which can subsequently
+spread</strong></del></span> <span class="inserted"><ins><em>device is 
tethered</em></ins></span> to <span class="removed"><del><strong>computers and 
other FitBit trackers</strong></del></span> <span class="inserted"><ins><em>a 
server.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
     proprietary tethering&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;But</em></ins></span> it <span class="removed"><del><strong>is 
the acceptance of
-their unjust practice</strong></del></span> <span 
class="inserted"><ins><em>also demonstrates</em></ins></span> that <span 
class="removed"><del><strong>teaches people to be 
doormats.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
device gives the company
+    &lt;p&gt;But it also demonstrates</em></ins></span> that <span 
class="removed"><del><strong>interact with
+them.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do</strong></del></span> 
the <span class="removed"><del><strong>encryption with
+proprietary firmware so you can't trust it.  Western Digital's &lt;a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+&ldquo;My Passport&rdquo; drives have a back 
door&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device gives the company
     surveillance capability.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Philips</strong></del></span>
+&lt;p&gt;
+Hospira infusion pumps, which are used to administer drugs to
+a patient, were rated &ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
+least secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
+researcher.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;
-    &lt;p&gt;A</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>lightbulbs &lt;a
-href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
-have been</strong></del></span> <span class="inserted"><ins><em>intravenous 
pump</em></ins></span>
-    designed <span class="removed"><del><strong>not to interact with other 
companies' smart
-lightbulbs&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;Depending on what drug</strong></del></span>
 
-&lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build it, 
it</strong></del></span> <span class="inserted"><ins><em>for 
hospitals</em></ins></span> is
-<span class="removed"><del><strong>cleverly serving</strong></del></span> 
<span class="inserted"><ins><em>connected to the internet. Naturally &lt;a
-    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;</em></ins></span>
-    its <span class="removed"><del><strong>manufacturer &lt;em&gt;against 
you&lt;/em&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>security has been cracked&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
+    designed for hospitals</em></ins></span> is <span 
class="removed"><del><strong>being infused,</strong></del></span> <span 
class="inserted"><ins><em>connected to</em></ins></span> the <span 
class="removed"><del><strong>insecurity could
+open</strong></del></span> <span class="inserted"><ins><em>internet. Naturally 
&lt;a
+    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses the term &lt;a
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring to crackers.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    referring</em></ins></span> to <span 
class="removed"><del><strong>murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
-DVDs and Bluray disks have DRM&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;That page uses spin terms</strong></del></span>
+&lt;p&gt;Due to</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people</em></ins></span> that <span 
class="removed"><del><strong>favor DRM,
-including</strong></del></span> <span class="inserted"><ins><em>use 
them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The</em></ins></span> bad security in <span 
class="removed"><del><strong>a drug pump, crackers could use it 
to</strong></del></span> <span class="inserted"><ins><em>many Internet of 
Stings devices allows</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
+kill patients&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to <span class="inserted"><ins><em>snoop on the people that use 
them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
-digital &ldquo;rights&rdquo; management&lt;/a&gt;
-and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Don't</em></ins></span> be <span 
class="removed"><del><strong>stupidly vulnerable to
+intrusion.&lt;/p&gt;
+&lt;/li&gt;
 
-  &lt;li id="M201708230"&gt;
-    &lt;p&gt;Sonos</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
-    told all its customers, &ldquo;Agree&rdquo;
-    to snooping or the product will stop working&lt;/a&gt;.  &lt;a
-    
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
-    Another article&lt;/a&gt; says they won't forcibly change the software, but
-    people won't be able to get any upgrades</em></ins></span> and <span 
class="inserted"><ins><em>eventually</em></ins></span> it <span 
class="removed"><del><strong>claims that &ldquo;artists&rdquo; (rather than 
companies) are
-primarily responsible for putting digital restrictions management into
-these disks.  Nonetheless, it is</strong></del></span> <span 
class="inserted"><ins><em>will
-    stop working.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+FTC punished</strong></del></span> a <span 
class="removed"><del><strong>company for making webcams with bad 
security&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all the stings.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It is unfortunate</em></ins></span> that <span 
class="removed"><del><strong>it was easy for anyone to watch 
them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
article uses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>reference for the facts.
-&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;It is possible</strong></del></span>
 
-&lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
-don't use Bluray disks!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201708230"&gt;
+    &lt;p&gt;Sonos &lt;a
+    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
+    told all its customers, &ldquo;Agree&rdquo;</em></ins></span>
+    to <span class="inserted"><ins><em>snooping or the product will stop 
working&lt;/a&gt;.</em></ins></span>  &lt;a
+<span 
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+kill</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
+    Another article&lt;/a&gt; says they won't forcibly change the software, 
but</em></ins></span>
+    people <span class="removed"><del><strong>by taking control of medical 
implants by radio&lt;/a&gt;.  More
+information in &lt;a
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
+&lt;a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Lots of &lt;a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;, and it 
can</strong></del></span> <span 
class="inserted"><ins><em>won't</em></ins></span> be <span 
class="removed"><del><strong>fatal.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows were taken 
over&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>able to 
get any upgrades</em></ins></span> and <span class="removed"><del><strong>turned
+into a botnet for the purpose of collecting customers' credit card
+numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>eventually it will
+    stop working.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="cameras-bugs"&gt;
-&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>id="M201706200"&gt;
-    &lt;p&gt;Many models</em></ins></span> of <span 
class="removed"><del><strong>network-connected 
surveillance</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected</em></ins></span> cameras
-    <span class="inserted"><ins><em>are tremendously insecure.  
They</em></ins></span> have <span class="inserted"><ins><em>login
-    accounts with hard-coded passwords, which can't be changed, 
and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-security bugs that allow anyone</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
-    is no way</em></ins></span> to <span class="removed"><del><strong>watch 
through them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="vizio-snoop"&gt;
+&lt;p&gt;Vizio
+&lt;a 
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+used</strong></del></span> <span class="inserted"><ins><em>id="M201708040"&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>firmware 
&ldquo;upgrade&rdquo;</strong></del></span> <span class="inserted"><ins><em>DJI 
drone</em></ins></span>
+    to <span class="removed"><del><strong>make its TVs</strong></del></span> 
snoop on <span class="removed"><del><strong>what
+users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;LG</strong></del></span> <span class="inserted"><ins><em>other 
people, DJI is in many cases</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+disabled network features&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>&lt;em&gt;previously 
purchased&lt;/em&gt;
+&ldquo;smart&rdquo; TVs,</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201706200"&gt;
+    &lt;p&gt;Many models of Internet-connected cameras
+    are tremendously insecure.  They have login
+    accounts with hard-coded passwords, which can't be changed, and &lt;a
+    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
+    is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big security hole; &lt;a
-href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Samsung claims</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;
-    &lt;p&gt;The proprietary code</em></ins></span> that <span 
class="removed"><del><strong>this is an &ldquo;open&rdquo; platform so the
-problem</strong></del></span> <span class="inserted"><ins><em>runs pacemakers,
+  &lt;li id="M201705250"&gt;
+    &lt;p&gt;The proprietary code that runs pacemakers,
     insulin pumps, and other medical devices is &lt;a
     href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
     security faults&lt;/a&gt;.&lt;/p&gt;
@@ -782,7 +885,7 @@
     unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
-    problem</em></ins></span> is partly the <span 
class="removed"><del><strong>fault of app developers. That is clearly true 
if</strong></del></span> <span class="inserted"><ins><em>fault of app 
developers. That is clearly true
+    problem is partly the fault of app developers. That is clearly true
     if the apps are proprietary software.&lt;/p&gt;
 
     &lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going
@@ -907,145 +1010,69 @@
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>company
-    already monitors. Tivo customers</em></ins></span> are <span 
class="removed"><del><strong>proprietary software.&lt;/p&gt;
-
-&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going to
-screw you.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;
-Malware found on</strong></del></span> <span class="inserted"><ins><em>unaware 
they're
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
-security cameras available through Amazon&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;A camera that records locally on physical media, and has no network
-connection, does not threaten people</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement</em></ins></span> with <span 
class="removed"><del><strong>surveillance&mdash;neither</strong></del></span> 
<span class="inserted"><ins><em>online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance</em></ins></span> by <span 
class="removed"><del><strong>watching people through the camera, nor through 
malware in the
-camera.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>default.&lt;/p&gt;</em></ins></span>
+    information with online social media participation, Tivo can now &lt;a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt; &lt;a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-FitBit</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
-    &lt;p&gt;FitBit</em></ins></span> fitness trackers have a <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;</em></ins></span>
+  &lt;li id="M201510210"&gt;
+    &lt;p&gt;FitBit fitness trackers have a &lt;a
+    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
     Bluetooth vulnerability&lt;/a&gt; that allows attackers to send malware
     to the devices, which can subsequently spread to computers and other
     FitBit trackers that interact with them.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt; &ldquo;Self-encrypting&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510200"&gt;
-    &lt;p&gt;&ldquo;Self-encrypting&rdquo;</em></ins></span> disk drives
+  &lt;li id="M201510200"&gt;
+    &lt;p&gt;&ldquo;Self-encrypting&rdquo; disk drives
     do the encryption with proprietary firmware so you
-    can't trust it.  Western Digital's <span class="removed"><del><strong>&lt;a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</strong></del></span>
 &ldquo;My Passport&rdquo; drives <span class="inserted"><ins><em>&lt;a
-    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</em></ins></span>
+    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a
+    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
     have a back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;
-Hospira infusion pumps, which</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
+  &lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people</em></ins></span> are <span class="removed"><del><strong>used 
to administer drugs to
-a patient, were rated &ldquo;&lt;a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
-least secure IP device I've ever seen&lt;/a&gt;&rdquo; 
by</strong></del></span> <span class="inserted"><ins><em>watching&lt;/a&gt;, 
even if it isn't</em></ins></span> a <span class="removed"><del><strong>security
-researcher.&lt;/p&gt;
-
-&lt;p&gt;Depending on what drug is being infused, the insecurity could
-open the door to murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506080"&gt;</em></ins></span>
+  &lt;li id="M201506080"&gt;
     &lt;p&gt;Due to bad security in a drug pump, crackers could use it to &lt;a
     
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
     kill patients&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
-&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
-intrusion.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;The &lt;a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-FTC punished a company for making webcams with bad security&lt;/a&gt; so
-that it was easy for anyone to watch them.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;It is possible to &lt;a
-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
-kill people by taking control of medical implants by radio&lt;/a&gt;.  More
-information in &lt;a
-href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
-&lt;a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Lots of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-hospital equipment has lousy security&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>it can be fatal.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-Point-of-sale terminals running Windows</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505050"&gt;
+  &lt;li id="M201505050"&gt;
     &lt;p&gt;Hospira infusion pumps, which are used
-    to administer drugs to a patient,</em></ins></span> were <span 
class="removed"><del><strong>taken over&lt;/a&gt; and turned
-into</strong></del></span> <span class="inserted"><ins><em>rated &ldquo;&lt;a
+    to administer drugs to a patient, were rated &ldquo;&lt;a
     
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
-    secure IP device I've ever seen&lt;/a&gt;&rdquo; by</em></ins></span> a 
<span class="removed"><del><strong>botnet for</strong></del></span> <span 
class="inserted"><ins><em>security
+    secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
     researcher.&lt;/p&gt;
 
-    &lt;p&gt;Depending on what drug is being infused,</em></ins></span> the 
<span class="removed"><del><strong>purpose of collecting customers' credit card
-numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>insecurity could open
-    the door to murder.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Depending on what drug is being infused, the insecurity could open
+    the door to murder.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="vizio-snoop"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;</em></ins></span>
+  &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+  &lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
@@ -1097,11 +1124,11 @@
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405200.1"&gt;</em></ins></span>
+  &lt;li id="M201405200.1"&gt;
     &lt;p&gt;LG &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
-    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
+    &ldquo;smart&rdquo; TVs,</em></ins></span> unless the purchasers agreed to 
let LG begin
     to snoop on them and distribute their personal data.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1390,7 +1417,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/03/25 10:33:58 $
+$Date: 2020/06/07 07:00:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- malware-appliances.de.po    25 Mar 2020 10:33:58 -0000      1.87
+++ malware-appliances.de.po    7 Jun 2020 07:00:05 -0000       1.88
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-03-25 10:26+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -104,6 +104,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "

Index: malware-appliances.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-appliances.es.po    26 Mar 2020 11:09:07 -0000      1.17
+++ malware-appliances.es.po    7 Jun 2020 07:00:05 -0000       1.18
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-03-25 10:26+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2020-03-26 11:58+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -70,6 +71,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- malware-appliances.fr.po    26 Mar 2020 17:22:59 -0000      1.146
+++ malware-appliances.fr.po    7 Jun 2020 07:00:05 -0000       1.147
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-03-25 10:26+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2020-03-26 18:22+0100\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -67,6 +68,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- malware-appliances.pot      25 Mar 2020 10:33:58 -0000      1.72
+++ malware-appliances.pot      7 Jun 2020 07:00:05 -0000       1.73
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-03-25 10:26+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -55,6 +55,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a "
+"href=\"https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html\";>
 "
+"paying a monthly fee for the use of that server</a>.  Because of the "
+"tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a "
 
"href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;hackers&rdquo;</a>)
  "
 "managed to interfere the Amazon Ring proprietary system, and <a "

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- malware-appliances.ru.po    28 May 2020 17:40:11 -0000      1.182
+++ malware-appliances.ru.po    7 Jun 2020 07:00:07 -0000       1.183
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-03-25 10:26+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -69,6 +70,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Some security breakers (wrongly referred in this article as <a href="
 "\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;"
 "hackers&rdquo;</a>)  managed to interfere the Amazon Ring proprietary "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- nl.po       1 Jun 2020 11:00:33 -0000       1.183
+++ nl.po       7 Jun 2020 07:00:07 -0000       1.184
@@ -2072,6 +2072,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- pl.po       1 Jun 2020 11:00:33 -0000       1.182
+++ pl.po       7 Jun 2020 07:00:07 -0000       1.183
@@ -1641,6 +1641,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- pot 1 Jun 2020 11:00:33 -0000       1.181
+++ pot 7 Jun 2020 07:00:07 -0000       1.182
@@ -1450,6 +1450,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-tethers.de-diff.html    25 Mar 2020 11:31:50 -0000      1.25
+++ proprietary-tethers.de-diff.html    7 Jun 2020 07:00:07 -0000       1.26
@@ -78,17 +78,25 @@
 &lt;div class="column-limit" id="proprietary-tethers"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
-    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>specifics.&lt;/p&gt;
+  &lt;li id="M202005070"&gt;
+    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
+    to a server. In May 2020, it ordered the purchasers to start &lt;a
+    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
+    paying a monthly fee for</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
 
 &lt;ul&gt;
 
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>company made 
them all cease to work&lt;/a&gt; by shutting down that
-    server.&lt;/p&gt;</em></ins></span>
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>use of that 
server&lt;/a&gt;.  Because of the
+    tethering, the hub is useless without that.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904260"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>game Metal Gear 
Rising</strong></del></span> <span class="inserted"><ins><em>Jibo robot toys 
were tethered to the manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
+    the company made them all cease to work&lt;/a&gt; by shutting down that
+    server.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>game Metal Gear 
Rising</strong></del></span> <span class="inserted"><ins><em>shutdown might 
ironically be good</em></ins></span> for <span 
class="removed"><del><strong>MacOS</strong></del></span> <span 
class="inserted"><ins><em>their users, since the
+    &lt;p&gt;The shutdown might ironically be good</em></ins></span> for <span 
class="removed"><del><strong>MacOS</strong></del></span> <span 
class="inserted"><ins><em>their users, since the
     product</em></ins></span> was <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="inserted"><ins><em>manipulate people by presenting</em></ins></span> a 
<span class="removed"><del><strong>server.
 The company</strong></del></span> <span class="inserted"><ins><em>phony
     semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
@@ -333,7 +341,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
@@ -343,7 +351,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/03/25 11:31:50 $
+$Date: 2020/06/07 07:00:07 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-tethers.de.po   25 Mar 2020 10:33:58 -0000      1.37
+++ proprietary-tethers.de.po   7 Jun 2020 07:00:07 -0000       1.38
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -131,6 +131,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -525,11 +534,12 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019+} Free Software
+# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free Software
 # | Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016-2018 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-tethers.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.es.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-tethers.es.po   21 Nov 2019 22:24:38 -0000      1.11
+++ proprietary-tethers.es.po   7 Jun 2020 07:00:07 -0000       1.12
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2019-11-21 12:27+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -95,6 +96,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -466,7 +476,13 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright &copy; 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary-tethers.fr.po   18 Nov 2019 17:15:34 -0000      1.68
+++ proprietary-tethers.fr.po   7 Jun 2020 07:00:07 -0000       1.69
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -90,6 +91,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -457,8 +467,9 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-tethers.ja-diff.html    31 Dec 2019 01:04:21 -0000      1.44
+++ proprietary-tethers.ja-diff.html    7 Jun 2020 07:00:07 -0000       1.45
@@ -63,7 +63,7 @@
 another way.&lt;/p&gt;
 
 &lt;p&gt;In some cases, tethering is used to do specific nasty things to the
-users.  This page</em></ins></span> reports instances where <span 
class="inserted"><ins><em>tethering was used to harm
+users.  This page</em></ins></span> reports instances where <span 
class="removed"><del><strong>proprietary software</strong></del></span> <span 
class="inserted"><ins><em>tethering was used to harm
 the users directly.&lt;/p&gt;
 &lt;/div&gt;
 
@@ -78,13 +78,24 @@
 &lt;div class="column-limit" id="proprietary-tethers"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202005070"&gt;
+    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that</em></ins></span> 
is tethered
+    to a <span class="inserted"><ins><em>server. In May 2020, it ordered the 
purchasers to start &lt;a
+    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
+    paying a monthly fee for the use of that server&lt;/a&gt;.  Because of the
+    tethering, the hub is useless without that.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904260"&gt;
     &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
     and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
-    the company made them all cease to work&lt;/a&gt; by shutting down that
+    the company made them all cease to work&lt;/a&gt; by shutting down 
that</em></ins></span>
     server.&lt;/p&gt;
 
-    &lt;p&gt;The shutdown might ironically be good for their users, since the
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;The shutdown might ironically be 
good for their users, since the
     product was designed to manipulate people by presenting a phony
     semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
   &lt;/li&gt;
@@ -125,13 +136,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201807050"&gt;
-    &lt;p&gt;The Jawbone fitness tracker was tethered to a</em></ins></span> 
proprietary <span class="removed"><del><strong>software</strong></del></span> 
<span class="inserted"><ins><em>phone
+    &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
     app.  In 2017, the company shut down and made the app stop working. &lt;a
     
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
     the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on a further nasty fillip, that sales of the
-    broken devices continued. But we think that</em></ins></span> is <span 
class="inserted"><ins><em>a secondary issue;
+    broken devices continued. But we think that is a secondary issue;
     it made the nasty consequences extend to some additional people.
     The fundamental wrong was to design the devices to depend on something
     else that didn't respect users' freedom.&lt;/p&gt;
@@ -139,10 +150,7 @@
 
   &lt;li id="M201806250"&gt;
     &lt;p&gt;The game Metal Gear Rising for
-    MacOS was</em></ins></span> tethered to a <span 
class="removed"><del><strong>server.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>server.  The 
company &lt;a
+    MacOS was tethered to a server.  The company &lt;a
     
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;
     shut down the server, and all copies stopped working&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -314,7 +322,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -325,7 +333,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/06/07 07:00:07 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary-tethers.ja.po   31 Dec 2019 01:04:21 -0000      1.36
+++ proprietary-tethers.ja.po   7 Jun 2020 07:00:07 -0000       1.37
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -95,6 +95,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -363,7 +372,8 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-tethers.pot     18 Nov 2019 15:05:19 -0000      1.33
+++ proprietary-tethers.pot     7 Jun 2020 07:00:09 -0000       1.34
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -70,6 +70,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a "
+"href=\"https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html\";>
 "
+"paying a monthly fee for the use of that server</a>.  Because of the "
+"tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a "
 "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
 "company made them all cease to work</a> by shutting down that server."
@@ -314,7 +323,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, 
Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-tethers.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-tethers.pt-br.po        22 May 2020 22:05:27 -0000      1.21
+++ proprietary-tethers.pt-br.po        7 Jun 2020 07:00:09 -0000       1.22
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2019-11-26 22:50-0200\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -90,6 +91,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -453,7 +463,11 @@
 "envio de traduções das páginas deste site."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary-tethers.ru.po   28 May 2020 17:40:13 -0000      1.75
+++ proprietary-tethers.ru.po   7 Jun 2020 07:00:09 -0000       1.76
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -92,6 +93,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."
@@ -457,8 +467,10 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.de-diff.html    25 May 2020 08:33:38 -0000      1.152
+++ proprietary.de-diff.html    7 Jun 2020 07:00:09 -0000       1.153
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,17 +57,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -127,16 +127,16 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -153,19 +153,19 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -212,6 +212,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202005070"&gt;
+    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
+    to a server. In May 2020, it ordered the purchasers to start &lt;a
+    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
+    paying a monthly fee for the use of that server&lt;/a&gt;.  Because of the
+    tethering, the hub is useless without that.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005250"&gt;
     &lt;p&gt;Tesla's cars have a &lt;a
     href="/proprietary/proprietary-back-doors.html#M201709090.1"&gt;
@@ -261,13 +269,6 @@
     to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
     encryption.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202003010"&gt;
-    &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and &lt;a
-    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -330,7 +331,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/05/25 08:33:38 $
+$Date: 2020/06/07 07:00:09 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary.de.po   25 May 2020 08:33:38 -0000      1.193
+++ proprietary.de.po   7 Jun 2020 07:00:09 -0000       1.194
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -518,13 +527,6 @@
 "the spyware sniffs signals, it bypasses encryption."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.269
retrieving revision 1.270
diff -u -b -r1.269 -r1.270
--- proprietary.es.po   29 May 2020 09:22:07 -0000      1.269
+++ proprietary.es.po   7 Jun 2020 07:00:09 -0000       1.270
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -312,6 +313,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -412,16 +422,6 @@
 "apagados</a>. Puesto que este software espía capta las señales, sortea el "
 "encriptado."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-"La aplicación Health Code de Alipay estima si el usuario está infectado por 
"
-"el Covid-19 e <a href=\"https://www.nytimes.com/2020/03/01/business/china-";
-"coronavirus-surveillance.html\">informa a la policía directamente</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -499,6 +499,16 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
+#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
+#~ "surveillance.html\"> tells the cops directly</a>."
+#~ msgstr ""
+#~ "La aplicación Health Code de Alipay estima si el usuario está infectado "
+#~ "por el Covid-19 e <a href=\"https://www.nytimes.com/2020/03/01/business/";
+#~ "china-coronavirus-surveillance.html\">informa a la policía directamente</"
+#~ "a>."
+
+#~ msgid ""
 #~ "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 #~ "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 #~ "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- proprietary.fr.po   26 May 2020 14:45:12 -0000      1.317
+++ proprietary.fr.po   7 Jun 2020 07:00:09 -0000       1.318
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2020-05-26 16:44+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -308,6 +309,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -406,16 +416,6 @@
 "a7616651.html\">se sert de leur micro et de leur caméra pour espionner, tout 
"
 "en les faisant paraître inactifs</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-"L'appli « Health Code » d'Alipay estime si l'utilisateur est infecté par 
le "
-"Covid-19 et <a href=\"https://www.nytimes.com/2020/03/01/business/china-";
-"coronavirus-surveillance.html\">en informe la police directement</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -488,3 +488,13 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
+#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
+#~ "surveillance.html\"> tells the cops directly</a>."
+#~ msgstr ""
+#~ "L'appli « Health Code » d'Alipay estime si l'utilisateur est infecté 
par "
+#~ "le Covid-19 et <a href=\"https://www.nytimes.com/2020/03/01/business/";
+#~ "china-coronavirus-surveillance.html\">en informe la police directement</"
+#~ "a>."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- proprietary.it-diff.html    25 May 2020 08:33:38 -0000      1.164
+++ proprietary.it-diff.html    7 Jun 2020 07:00:09 -0000       1.165
@@ -57,9 +57,8 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,8 +69,9 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,6 +211,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202005070"&gt;
+    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
+    to a server. In May 2020, it ordered the purchasers to start &lt;a
+    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
+    paying a monthly fee for the use of that server&lt;/a&gt;.  Because of the
+    tethering, the hub is useless without that.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005250"&gt;
     &lt;p&gt;Tesla's cars have a &lt;a
     href="/proprietary/proprietary-back-doors.html#M201709090.1"&gt;
@@ -260,13 +268,6 @@
     to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
     encryption.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202003010"&gt;
-    &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and &lt;a
-    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -329,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/05/25 08:33:38 $
+$Date: 2020/06/07 07:00:09 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary.it.po   25 May 2020 08:33:38 -0000      1.202
+++ proprietary.it.po   7 Jun 2020 07:00:09 -0000       1.203
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -522,13 +531,6 @@
 "the spyware sniffs signals, it bypasses encryption."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary.ja-diff.html    25 May 2020 08:33:38 -0000      1.168
+++ proprietary.ja-diff.html    7 Jun 2020 07:00:09 -0000       1.169
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,12 +58,12 @@
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
-   <span class="inserted"><ins><em>color: #004caa;
+ #skiplinks a, #skiplinks a:visited {
+   color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -156,13 +156,13 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
@@ -186,10 +186,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -209,6 +209,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202005070"&gt;
+    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
+    to a server. In May 2020, it ordered the purchasers to start &lt;a
+    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
+    paying a monthly fee for the use of that server&lt;/a&gt;.  Because of the
+    tethering, the hub is useless without that.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005250"&gt;
     &lt;p&gt;Tesla's cars have a &lt;a
     href="/proprietary/proprietary-back-doors.html#M201709090.1"&gt;
@@ -258,13 +266,6 @@
     to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
     encryption.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202003010"&gt;
-    &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and &lt;a
-    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -327,7 +328,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/05/25 08:33:38 $
+$Date: 2020/06/07 07:00:09 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- proprietary.ja.po   25 May 2020 08:33:38 -0000      1.186
+++ proprietary.ja.po   7 Jun 2020 07:00:09 -0000       1.187
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -383,13 +392,6 @@
 "the spyware sniffs signals, it bypasses encryption."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary.nl-diff.html    25 May 2020 08:33:38 -0000      1.165
+++ proprietary.nl-diff.html    7 Jun 2020 07:00:09 -0000       1.166
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -211,6 +211,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202005070"&gt;
+    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
+    to a server. In May 2020, it ordered the purchasers to start &lt;a
+    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
+    paying a monthly fee for the use of that server&lt;/a&gt;.  Because of the
+    tethering, the hub is useless without that.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005250"&gt;
     &lt;p&gt;Tesla's cars have a &lt;a
     href="/proprietary/proprietary-back-doors.html#M201709090.1"&gt;
@@ -260,13 +268,6 @@
     to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
     encryption.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202003010"&gt;
-    &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and &lt;a
-    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -329,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/05/25 08:33:38 $
+$Date: 2020/06/07 07:00:09 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary.nl.po   25 May 2020 08:33:38 -0000      1.176
+++ proprietary.nl.po   7 Jun 2020 07:00:09 -0000       1.177
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -363,6 +363,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -426,13 +435,6 @@
 "the spyware sniffs signals, it bypasses encryption."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.pl-diff.html    25 May 2020 08:33:38 -0000      1.182
+++ proprietary.pl-diff.html    7 Jun 2020 07:00:09 -0000       1.183
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -62,8 +62,8 @@
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -114,8 +114,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>January, 2020, the pages in this directory 
list around 450
-instances of malicious functionalities (with more than 500 references to
+&lt;p&gt;As of January, 2020, the pages in this directory list around 450
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 500 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -156,16 +156,16 @@
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -209,6 +209,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202005070"&gt;
+    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
+    to a server. In May 2020, it ordered the purchasers to start &lt;a
+    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
+    paying a monthly fee for the use of that server&lt;/a&gt;.  Because of the
+    tethering, the hub is useless without that.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005250"&gt;
     &lt;p&gt;Tesla's cars have a &lt;a
     href="/proprietary/proprietary-back-doors.html#M201709090.1"&gt;
@@ -258,13 +266,6 @@
     to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
     encryption.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202003010"&gt;
-    &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and &lt;a
-    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -327,7 +328,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/05/25 08:33:38 $
+$Date: 2020/06/07 07:00:09 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary.pl.po   25 May 2020 08:33:38 -0000      1.169
+++ proprietary.pl.po   7 Jun 2020 07:00:09 -0000       1.170
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -540,6 +540,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -603,13 +612,6 @@
 "the spyware sniffs signals, it bypasses encryption."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary.pot     25 May 2020 08:33:38 -0000      1.166
+++ proprietary.pot     7 Jun 2020 07:00:09 -0000       1.167
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -257,6 +257,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a "
+"href=\"https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html\";>
 "
+"paying a monthly fee for the use of that server</a>.  Because of the "
+"tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a "
 "href=\"/proprietary/proprietary-back-doors.html#M201709090.1\"> universal "
 "remote back door</a>.  Tesla used it to <a "
@@ -320,13 +329,6 @@
 "turned off</a>. Since the spyware sniffs signals, it bypasses encryption."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html\";>
 "
-"tells the cops directly</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.293
retrieving revision 1.294
diff -u -b -r1.293 -r1.294
--- proprietary.pt-br.po        26 May 2020 13:59:30 -0000      1.293
+++ proprietary.pt-br.po        7 Jun 2020 07:00:09 -0000       1.294
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2020-05-26 10:33-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -305,6 +306,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -404,16 +414,6 @@
 "através de seus microfones e câmeras enquanto os faz parecer 
desligados</a>. "
 "Como o spyware detecta sinais, ignora a criptografia."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-"O aplicativo Alipay Health Code estima se o usuário possui Covid-19 e <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> informa aos policiais diretamente</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -489,6 +489,15 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
+#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
+#~ "surveillance.html\"> tells the cops directly</a>."
+#~ msgstr ""
+#~ "O aplicativo Alipay Health Code estima se o usuário possui Covid-19 e <a "
+#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
+#~ "surveillance.html\"> informa aos policiais diretamente</a>."
+
+#~ msgid ""
 #~ "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 #~ "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 #~ "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.351
retrieving revision 1.352
diff -u -b -r1.351 -r1.352
--- proprietary.ru.po   28 May 2020 17:59:59 -0000      1.351
+++ proprietary.ru.po   7 Jun 2020 07:00:09 -0000       1.352
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -312,6 +313,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -413,16 +423,6 @@
 "выключены</a>. Поскольку шпионская 
программа перехватывает сигналы, "
 "шифрование от этого не защищает."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-"Приложение Aliplay Health Code оценивает, есть ли у 
пользователя Covid-19, и "
-"<a href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> докладывает прямо ментам</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -499,6 +499,15 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
+#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
+#~ "surveillance.html\"> tells the cops directly</a>."
+#~ msgstr ""
+#~ "Приложение Aliplay Health Code оценивает, есть ли 
у пользователя "
+#~ "Covid-19, и <a href=\"https://www.nytimes.com/2020/03/01/business/china-";
+#~ "coronavirus-surveillance.html\"> докладывает прямо 
ментам</a>."
+
+#~ msgid ""
 #~ "The Amazon Ring app does <a href=\"https://www.theguardian.com/";
 #~ "technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"
 #~ "\"> surveillance for other companies as well as for Amazon</a>."

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary.tr.po   30 May 2020 09:19:20 -0000      1.20
+++ proprietary.tr.po   7 Jun 2020 07:00:09 -0000       1.21
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2020-05-30 11:11+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.3\n"
 
@@ -305,6 +306,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -405,16 +415,6 @@
 "için &ldquo;akıllı&rdquo; TV ve telefonlardaki mevcut açıkları istismar 
"
 "etti. Casus yazılım sinyalleri yakaladığı için şifrelemeyi es 
geçiyor."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-"Alipay Health Code uygulaması kullanıcının Covid-19 olup olmadığını "
-"tahminliyor ve <a href=\"https://www.nytimes.com/2020/03/01/business/china-";
-"coronavirus-surveillance.html\"> sonucu doğrudan polislere bildiriyor</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -495,6 +495,16 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
+#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
+#~ "surveillance.html\"> tells the cops directly</a>."
+#~ msgstr ""
+#~ "Alipay Health Code uygulaması kullanıcının Covid-19 olup 
olmadığını "
+#~ "tahminliyor ve <a href=\"https://www.nytimes.com/2020/03/01/business/";
+#~ "china-coronavirus-surveillance.html\"> sonucu doğrudan polislere "
+#~ "bildiriyor</a>."
+
+#~ msgid ""
 #~ "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 #~ "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 #~ "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> "

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary.zh-cn.po        25 May 2020 23:58:45 -0000      1.11
+++ proprietary.zh-cn.po        7 Jun 2020 07:00:09 -0000       1.12
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2020-05-26 07:39+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-07 06:55+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -288,6 +289,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -375,16 +385,6 @@
 "a7616651.html\">通过麦å…
‹é£Žå’Œæ‘„像头进行间谍活动,同时看上去又像是处于关闭状态"
 "</a>。由于间谍软件会嗅探信号,绕过了加密。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-"支付宝健康码应用评估使用者是否有 Covid-19 病毒并 <a 
href=\"https://www.";
-"nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html\">直接告"
-"诉警方</a>。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -462,6 +462,15 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
+#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
+#~ "surveillance.html\"> tells the cops directly</a>."
+#~ msgstr ""
+#~ "支付宝健康码应用评估使用者是否有 Covid-19 病毒并 <a 
href=\"https://www.";
+#~ 
"nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html\">直接"
+#~ "告诉警方</a>。"
+
+#~ msgid ""
 #~ "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 #~ "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 #~ "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.zh-tw-diff.html 25 May 2020 08:33:39 -0000      1.145
+++ proprietary.zh-tw-diff.html 7 Jun 2020 07:00:09 -0000       1.146
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,17 +57,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -127,16 +127,16 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -153,19 +153,19 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -212,6 +212,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202005070"&gt;
+    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
+    to a server. In May 2020, it ordered the purchasers to start &lt;a
+    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
+    paying a monthly fee for the use of that server&lt;/a&gt;.  Because of the
+    tethering, the hub is useless without that.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005250"&gt;
     &lt;p&gt;Tesla's cars have a &lt;a
     href="/proprietary/proprietary-back-doors.html#M201709090.1"&gt;
@@ -261,13 +269,6 @@
     to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
     encryption.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202003010"&gt;
-    &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and &lt;a
-    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -330,7 +331,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/05/25 08:33:39 $
+$Date: 2020/06/07 07:00:09 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary.zh-tw.po        25 May 2020 08:33:39 -0000      1.156
+++ proprietary.zh-tw.po        7 Jun 2020 07:00:09 -0000       1.157
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-05-25 08:25+0000\n"
+"POT-Creation-Date: 2020-06-07 06:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -433,6 +433,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
 "html#M201709090.1\"> universal remote back door</a>.  Tesla used it to <a "
 "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-";
@@ -496,13 +505,6 @@
 "the spyware sniffs signals, it bypasses encryption."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
-"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
-"surveillance.html\"> tells the cops directly</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.242
retrieving revision 1.243
diff -u -b -r1.242 -r1.243
--- pt-br.po    1 Jun 2020 11:00:34 -0000       1.242
+++ pt-br.po    7 Jun 2020 07:00:09 -0000       1.243
@@ -1811,6 +1811,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.404
retrieving revision 1.405
diff -u -b -r1.404 -r1.405
--- ru.po       1 Jun 2020 12:58:38 -0000       1.404
+++ ru.po       7 Jun 2020 07:00:09 -0000       1.405
@@ -2120,6 +2120,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- tr.po       1 Jun 2020 11:00:34 -0000       1.13
+++ tr.po       7 Jun 2020 07:00:09 -0000       1.14
@@ -1574,6 +1574,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- zh-cn.po    1 Jun 2020 11:00:34 -0000       1.9
+++ zh-cn.po    7 Jun 2020 07:00:09 -0000       1.10
@@ -1548,6 +1548,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- zh-tw.po    1 Jun 2020 11:00:34 -0000       1.182
+++ zh-tw.po    7 Jun 2020 07:00:09 -0000       1.183
@@ -1638,6 +1638,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
+"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
+"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
+"subscription-model.html\"> paying a monthly fee for the use of that server</"
+"a>.  Because of the tethering, the hub is useless without that."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]