www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sat, 13 Jun 2020 06:00:28 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/06/13 06:00:28

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.es.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po nl.po pl.po pot 
                         proprietary-tethers.de-diff.html 
                         proprietary-tethers.de.po 
                         proprietary-tethers.es.po 
                         proprietary-tethers.fr.po 
                         proprietary-tethers.ja-diff.html 
                         proprietary-tethers.ja.po 
                         proprietary-tethers.pot 
                         proprietary-tethers.pt-br.po 
                         proprietary-tethers.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.321&r2=1.322
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.es.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.294&r2=1.295
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.353&r2=1.354
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.406&r2=1.407
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.183&r2=1.184

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- de.po       7 Jun 2020 07:00:04 -0000       1.183
+++ de.po       13 Jun 2020 10:00:26 -0000      1.184
@@ -2605,6 +2605,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- es.po       8 Jun 2020 09:29:43 -0000       1.263
+++ es.po       13 Jun 2020 10:00:26 -0000      1.264
@@ -2499,6 +2499,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.321
retrieving revision 1.322
diff -u -b -r1.321 -r1.322
--- fr.po       7 Jun 2020 07:13:19 -0000       1.321
+++ fr.po       13 Jun 2020 10:00:26 -0000      1.322
@@ -2167,6 +2167,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- it.po       7 Jun 2020 07:00:04 -0000       1.183
+++ it.po       13 Jun 2020 10:00:26 -0000      1.184
@@ -2544,6 +2544,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- ja.po       7 Jun 2020 07:00:04 -0000       1.191
+++ ja.po       13 Jun 2020 10:00:26 -0000      1.192
@@ -1951,6 +1951,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-appliances.de-diff.html     7 Jun 2020 07:00:04 -0000       1.54
+++ malware-appliances.de-diff.html     13 Jun 2020 10:00:27 -0000      1.55
@@ -132,176 +132,193 @@
     a</em></ins></span> security <span class="removed"><del><strong>has been 
cracked&lt;/a&gt;.&lt;/p&gt;
   &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>vulnerability</em></ins></span> that <span 
class="removed"><del><strong>this article misuses the 
term</strong></del></span> <span class="inserted"><ins><em>enabled attackers 
to</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-     referring</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop on the household
-    through connected surveillance devices.&lt;/p&gt;
-
-    &lt;p&gt;Knowledge of the wifi password would not be 
sufficient</em></ins></span> to <span 
class="removed"><del><strong>crackers.&lt;/p&gt;
+     referring to crackers.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;The bad security in</strong></del></span> <span 
class="inserted"><ins><em>carry
-    out any significant surveillance if the devices implemented proper
-    security, including encryption. But</em></ins></span> many <span 
class="removed"><del><strong>Internet of Stings</strong></del></span> devices
-    <span class="removed"><del><strong>allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
 <span class="inserted"><ins><em>with proprietary
-    software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were tethered</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> the <span 
class="removed"><del><strong>people that use them&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Don't be a sucker&mdash;reject all</strong></del></span> <span 
class="inserted"><ins><em>manufacturer's server,
-    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>stings.&lt;/p&gt;
-  &lt;p&gt;It is unfortunate</strong></del></span> <span 
class="inserted"><ins><em>company made them all cease to work&lt;/a&gt; by 
shutting down</em></ins></span> that
-    <span class="inserted"><ins><em>server.&lt;/p&gt;
-
-    &lt;p&gt;The shutdown might ironically be good for their users, 
since</em></ins></span> the <span class="removed"><del><strong>article uses the
+  &lt;p&gt;The bad security in many Internet of Stings devices
+    allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and</em></ins></span> snoop on 
the <span class="removed"><del><strong>people that use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+  &lt;p&gt;It is unfortunate that the article uses the
   term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Many models</strong></del></span>
-    <span class="inserted"><ins><em>product was designed to manipulate people 
by presenting a phony
-    semblance</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras are tremendously 
insecure.
-  They have login accounts with hard-coded passwords, which can't be
-  changed,</strong></del></span> <span 
class="inserted"><ins><em>emotions,</em></ins></span> and <span 
class="removed"><del><strong>&lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way to
-  delete these accounts either&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>was most certainly spying on 
them.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  &lt;p&gt;Many models</strong></del></span> <span 
class="inserted"><ins><em>household
+    through connected surveillance devices.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>proprietary code that runs 
pacemakers, insulin pumps, and other
-medical devices is</strong></del></span> <span 
class="inserted"><ins><em>Medtronics Conexus Telemetry Protocol 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models</em></ins></span> of <span 
class="removed"><del><strong>gross security faults&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Knowledge</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras are tremendously 
insecure.
+  They have login accounts with hard-coded passwords, which 
can't</strong></del></span> <span class="inserted"><ins><em>the wifi password 
would not</em></ins></span> be
+  <span class="removed"><del><strong>changed, and &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way</strong></del></span> <span 
class="inserted"><ins><em>sufficient</em></ins></span> to
+  <span class="removed"><del><strong>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;Users are suing Bose for &lt;a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing a spyware app for its headphones&lt;/a&gt;.
-Specifically, the app would record</strong></del></span> <span 
class="inserted"><ins><em>implantable
-    defibrillators&lt;/a&gt; and</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>devices they connect to.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
+medical</strong></del></span> <span class="inserted"><ins><em>carry
+    out any significant surveillance if the</em></ins></span> devices <span 
class="removed"><del><strong>is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by</em></ins></span> the 
<span class="removed"><del><strong>audio files
-users listen</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>correct them. This means you can't rely on 
proprietary software
-    developers to fix bugs in their products.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Users</strong></del></span> <span 
class="inserted"><ins><em>implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they</em></ins></span> are <span 
class="removed"><del><strong>suing Bose</strong></del></span> <span 
class="inserted"><ins><em>also used by their
+    manufacturers</em></ins></span> for <span 
class="inserted"><ins><em>snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902270"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>suit 
accuses</strong></del></span> <span class="inserted"><ins><em>Ring (now Amazon) 
doorbell camera is designed so</em></ins></span> that <span 
class="removed"><del><strong>this was done without the users' consent.
-If</strong></del></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch 
all</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>time. 
Now</em></ins></span> it <span class="removed"><del><strong>acceptable? No way! 
It should be flat</strong></del></span> <span 
class="inserted"><ins><em>turns</em></ins></span> out
-    <span class="inserted"><ins><em>that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal to design the app</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
-    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201909061"&gt;
+    &lt;p&gt;Best Buy made controllable appliances and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing a spyware app for its headphones&lt;/a&gt;.
+Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
+    shut down</em></ins></span> the <span class="removed"><del><strong>app 
would record the names of the audio files
+users listen</strong></del></span> <span 
class="inserted"><ins><em>service</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
+&lt;/p&gt;
 
-    &lt;p&gt;The third party vulnerability is presumably
-    unintentional and Amazon will probably fix it. However, we
-    do not expect Amazon</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+&lt;p&gt;The suit accuses</strong></del></span> <span 
class="inserted"><ins><em>control them through&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While it is laudable</em></ins></span> that <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>Best Buy recognized it</em></ins></span> was <span 
class="removed"><del><strong>done without the users' consent.
+If</strong></del></span> <span 
class="inserted"><ins><em>mistreating</em></ins></span>
+    the <span class="removed"><del><strong>fine print of</strong></del></span> 
<span class="inserted"><ins><em>customers by doing so, this doesn't 
alter</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
+would</strong></del></span> <span 
class="inserted"><ins><em>facts</em></ins></span> that <span 
class="removed"><del><strong>make it acceptable? No way! It should be flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal to design</strong></del></span>
+    <span class="inserted"><ins><em>tethering</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li id="anova"&gt;
-  &lt;p&gt;Anova sabotaged users' cooking devices with a 
downgrade</strong></del></span> <span class="inserted"><ins><em>change the 
design</em></ins></span> that
-  <span class="removed"><del><strong>tethered them to a remote 
server.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
-  cookers won't function.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
-    Amazon to watch&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;p&gt;Anova sabotaged users' cooking devices with a downgrade that
+  tethered them</strong></del></span> <span 
class="inserted"><ins><em>device</em></ins></span> to a <span 
class="removed"><del><strong>remote server. &lt;a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
+  cookers won't function.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant 
dishwasher</strong></del></span> <span class="inserted"><ins><em>particular 
server</em></ins></span> is
+<span class="removed"><del><strong>&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
 <span class="inserted"><ins><em>a path</em></ins></span> to <span 
class="inserted"><ins><em>screwing</em></ins></span> the <span 
class="removed"><del><strong>Internet,
+its security</strong></del></span>
+    <span class="inserted"><ins><em>users, and that it</em></ins></span> is 
<span class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;For example,</strong></del></span> a <span 
class="removed"><del><strong>cracker can gain access to</strong></del></span> 
<span class="inserted"><ins><em>consequence of having nonfree software 
in</em></ins></span> the <span class="removed"><del><strong>dishwasher's 
filesystem,
+ infect it with malware,</strong></del></span>
+    <span class="inserted"><ins><em>device.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher 
is</strong></del></span>
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's 
server,</em></ins></span>
+    and <span class="removed"><del><strong>force</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>dishwasher</strong></del></span> 
<span class="inserted"><ins><em>company made them all cease</em></ins></span> 
to <span class="removed"><del><strong>launch attacks on
+ other devices in</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt; by shutting down that
+    server.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="inserted"><ins><em>make sure</em></ins></span> the <span 
class="removed"><del><strong>Internet,
-its security</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;For example, a cracker can gain access to</strong></del></span> <span 
class="inserted"><ins><em>still
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>dishwasher's filesystem,
- infect it with malware,</strong></del></span> <span 
class="inserted"><ins><em>subscription,</em></ins></span> and <span 
class="removed"><del><strong>force</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
-    paid for.&lt;/p&gt;
-
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>dishwasher to launch attacks</strong></del></span> 
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases, it spies</em></ins></span> on
- <span class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
-    restrictions</em></ins></span> in the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
- such attacks could potentially put hundreds</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> of <span 
class="removed"><del><strong>lives at risk.&lt;/p&gt;
+    &lt;p&gt;The shutdown might ironically be good for their users, 
since</em></ins></span> the <span class="removed"><del><strong>network. Since 
these dishwashers are used in hospitals,
+ such attacks could potentially put hundreds of lives at risk.&lt;/p&gt;
 
 &lt;/li&gt;
 &lt;li&gt;
-&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
+&lt;p&gt;If you buy</strong></del></span>
+    <span class="inserted"><ins><em>product was designed to manipulate people 
by presenting</em></ins></span> a <span class="removed"><del><strong>used 
&ldquo;smart&rdquo; car, house, TV, refrigerator,
 etc.,
 usually &lt;a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
-previous owners can still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;</em></ins></span>
+previous owners can still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phony
+    semblance of emotions, and was most certainly spying on 
them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
   &lt;p&gt;Vizio
     &ldquo;smart&rdquo;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-      report everything that is viewed on them, and not just broadcasts
-      and cable&lt;/a&gt;. Even if</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span class="removed"><del><strong>image is 
coming from</strong></del></span> <span class="inserted"><ins><em>video they 
capture to Amazon servers&lt;/a&gt;, which save it
-    long-term.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+      report everything</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities</em></ins></span> that <span 
class="removed"><del><strong>is viewed on them,</strong></del></span> <span 
class="inserted"><ins><em>affect several models of implantable
+    defibrillators&lt;/a&gt;</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>the devices they connect to.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by,</em></ins></span> the user's <span 
class="removed"><del><strong>own
-    computer,</strong></del></span> <span class="inserted"><ins><em>front 
door.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at</em></ins></span> the <span class="removed"><del><strong>TV reports 
what it is. The existence of a way</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has 
tried</em></ins></span> to
-    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>prevent that
-    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon 
gets</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>video&mdash;Amazon expects society to 
surrender to.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This protocol has been around since 2006,</em></ins></span> and 
<span class="removed"><del><strong>cable&lt;/a&gt;. Even 
if</strong></del></span> <span class="inserted"><ins><em>similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>designed so that</em></ins></span> the <span 
class="removed"><del><strong>user's own
+    computer,</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch 
all</em></ins></span> the <span class="removed"><del><strong>TV reports 
what</strong></del></span> <span class="inserted"><ins><em>time. 
Now</em></ins></span> it <span class="removed"><del><strong>is. The existence 
of a way</strong></del></span> <span class="inserted"><ins><em>turns out
+    that &lt;a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and Amazon will probably fix it. However, we
+    do not expect Amazon</em></ins></span> to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>change</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it</strong></del></span> 
<span class="inserted"><ins><em>design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages 
than</em></ins></span> were <span class="removed"><del><strong>not hidden 
as</strong></del></span>
+    <span class="inserted"><ins><em>paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>was</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+    restrictions</em></ins></span> in
+    <span class="removed"><del><strong>these TVs, does not 
legitimize</strong></del></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;More or less all &ldquo;smart&rdquo;</strong></del></span>
+&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio</em></ins></span> TVs &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;The report was as of 2014, but we don't expect this has got
 better.&lt;/p&gt;
 
-&lt;p&gt;This shows that laws requiring products to get users' formal
+&lt;p&gt;This</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video</em></ins></span> shows <span 
class="inserted"><ins><em>everyone</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
 consent before collecting personal data are totally inadequate.  And
-what happens if a user declines consent?  Probably the TV will say,
-&ldquo;Without your consent to tracking,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the TV <span 
class="removed"><del><strong>will not
+what happens if a user declines consent?  Probably</strong></del></span> <span 
class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span class="removed"><del><strong>TV 
will say,
+&ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring used</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look
+    at</em></ins></span> the <span class="removed"><del><strong>TV will not
 work.&rdquo;&lt;/p&gt;
 
-&lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span 
class="inserted"><ins><em>sees,&rdquo;&lt;/a&gt; in</em></ins></span> the
-<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;Some LG
-TVs &lt;a href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
+&lt;p&gt;Proper laws would say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>videos freely.  It appears Amazon has 
tried</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span> <span class="inserted"><ins><em>prevent that
+    secondary abuse, but</em></ins></span> the
+<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Some LG</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
+    &lt;p&gt;Vizio</em></ins></span> TVs &lt;a <span 
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
 tyrants&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;&lt;a
 
href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
-Samsung &ldquo;Smart&rdquo; TVs have turned Linux into</strong></del></span> 
<span class="inserted"><ins><em>own words of</em></ins></span> the <span 
class="removed"><del><strong>base
-for a tyrant system&lt;/a&gt; so as</strong></del></span> <span 
class="inserted"><ins><em>company's
+Samsung &ldquo;Smart&rdquo; TVs have turned Linux into</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>base
+for a tyrant system&lt;/a&gt; so as</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in the own words of the 
company's
     CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>impose DRM.
 What enables Samsung</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
@@ -327,117 +344,118 @@
 &lt;p&gt;The company's statement</strong></del></span> that <span 
class="removed"><del><strong>it anonymizes</strong></del></span>
     <span class="inserted"><ins><em>matter),</em></ins></span> the <span 
class="removed"><del><strong>data may be true,
 but</strong></del></span> <span class="inserted"><ins><em>easiest way to make 
sure</em></ins></span> it <span class="removed"><del><strong>doesn't really 
matter. If</strong></del></span> <span class="inserted"><ins><em>isn't spying 
on you is
-    to disconnect</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
+    to disconnect</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>data to</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use</em></ins></span> a <span 
class="removed"><del><strong>data broker,
+the data broker</strong></del></span> <span 
class="inserted"><ins><em>terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is</em></ins></span> to <span 
class="inserted"><ins><em>get your own router (which can
-    be an old computer running completely free software), and set 
up</em></ins></span> a <span class="removed"><del><strong>data broker,
-the data broker</strong></del></span>
-    <span class="inserted"><ins><em>firewall to block connections to Vizio's 
servers. Or, as a last resort,
-    you</em></ins></span> can <span class="removed"><del><strong>figure out 
who the user is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>replace your TV with another 
model.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google/Alphabet</strong></del></span>
+    if you are technically oriented, is to get your own router 
(which</em></ins></span> can <span class="removed"><del><strong>figure out who 
the user is.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
-intentionally broke Revolv home automatic control products that depended on
-a server&lt;/a&gt; to function.  The lesson is, don't stand for that! Insist
+&lt;li&gt;
+&lt;p&gt;Google/Alphabet &lt;a
+href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
+intentionally broke Revolv home automatic control products that depended 
on</strong></del></span>
+    <span class="inserted"><ins><em>be an old computer running completely free 
software), and set up</em></ins></span> a <span 
class="removed"><del><strong>server&lt;/a&gt;</strong></del></span>
+    <span class="inserted"><ins><em>firewall</em></ins></span> to <span 
class="removed"><del><strong>function.  The lesson is, don't stand for that! 
Insist
 on self-contained computers that run free software!&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;ARRIS cable modem has</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>&lt;a
+&lt;p&gt;ARRIS cable modem has</strong></del></span> <span 
class="inserted"><ins><em>block connections to Vizio's servers. Or, 
as</em></ins></span> a <span class="removed"><del><strong>&lt;a
 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-backdoor</strong></del></span> <span class="inserted"><ins><em>better
-    name!&lt;/p&gt;
-
-    &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's</em></ins></span> in the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;</em></ins></span>
+backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>last resort,
+    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers are very innovative&mdash;at 
blocking</em></ins></span> the <span class="removed"><del><strong>proprietary
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
 &ldquo;Left Hand&rdquo; operating system have back doors that give 
HP</strong></del></span>
-    <span class="inserted"><ins><em>use of independent replacement ink 
cartridges. Their &ldquo;security
-    upgrades&rdquo; occasionally impose new forms of cartridge 
DRM.</em></ins></span> &lt;a
+
+  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a
 <span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
-remote login access&lt;/a&gt; to them.  HP claims that this does not 
give</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;</em></ins></span>
-    HP
-<span class="removed"><del><strong>access to</strong></del></span> <span 
class="inserted"><ins><em>and Epson have done this&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does 
not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;</em></ins></span>
+    give <span class="removed"><del><strong>HP
+access to the customer's data, but if</strong></del></span> the <span 
class="removed"><del><strong>back door allows
+installation</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy</em></ins></span> of 
<span class="removed"><del><strong>software changes, a change 
could</strong></del></span> <span class="inserted"><ins><em>everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; 
would</em></ins></span> be <span 
class="removed"><del><strong>installed</strong></del></span> <span 
class="inserted"><ins><em>a better
+    name!&lt;/p&gt;
 
-  &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>company's server. They have
-    all</em></ins></span> the <span class="removed"><del><strong>back door 
allows
-installation</strong></del></span> <span class="inserted"><ins><em>nasty 
characteristics</em></ins></span> of <span 
class="removed"><del><strong>software changes,</strong></del></span> <span 
class="inserted"><ins><em>such devices: &lt;a
-    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of</em></ins></span> a 
<span class="removed"><del><strong>change could be installed that
-would give access to</strong></del></span> <span 
class="inserted"><ins><em>specific user, or of
-    all users at once), as well as</em></ins></span> the <span 
class="removed"><del><strong>customer's data.
+    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that
+<span class="removed"><del><strong>would give access</strong></del></span> 
<span class="inserted"><ins><em>these
+    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>customer's data.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;&lt;a
 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
-dlink</strong></del></span> <span 
class="inserted"><ins><em>risk</em></ins></span> of an <span 
class="removed"><del><strong>eye.&lt;/p&gt;
+Some D-Link routers&lt;/a&gt; have a back door</strong></del></span> <span 
class="inserted"><ins><em>videos. That's not
+    security</em></ins></span> for <span class="removed"><del><strong>changing 
settings in a
+dlink</strong></del></span> <span class="inserted"><ins><em>your home. 
Security means making sure they don't get to
+    see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use</em></ins></span> of <span class="removed"><del><strong>an 
eye.&lt;/p&gt;
 
 &lt;p&gt;
-&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of routers
-have back doors&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outage (which is what
-    just happened).&lt;/p&gt;
+&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models</strong></del></span> <span class="inserted"><ins><em>independent 
replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms</em></ins></span> of <span 
class="removed"><del><strong>routers</strong></del></span> <span 
class="inserted"><ins><em>cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson</em></ins></span> have <span 
class="removed"><del><strong>back doors&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;In addition, setting the desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;</em></ins></span>
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>done this&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
-The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+&lt;p&gt;The</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201809260"&gt;
+    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
+    only through the company's server. They have
+    all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+&ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it won't accept
+third-party printing materials.  It is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
+    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
+    all users at once), as well as</em></ins></span> the <span 
class="removed"><del><strong>Keurig</strong></del></span> <span 
class="inserted"><ins><em>risk</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it</strong></del></span> <span 
class="inserted"><ins><em>an outage (which</em></ins></span> is
+<span class="removed"><del><strong>being discontinued, which means that 
eventually authorized materials won't
+be available and</strong></del></span> <span class="inserted"><ins><em>what
+    just happened).&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201809240"&gt;
+    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
+
+&lt;p&gt;With a &lt;a 
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer that gets</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
+    nonfree software. With an old-fashioned thermostat, you can do it
+    using controls right on</em></ins></span> the <span 
class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, this problem 
would not
+even be a remote possibility.&lt;/p&gt;
+
+&lt;p&gt;How pitiful</strong></del></span> <span 
class="inserted"><ins><em>thermostat.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;</em></ins></span>
+    hide voice commands in other audio&lt;/a&gt;, so</em></ins></span> that 
<span class="inserted"><ins><em>people cannot hear
+    them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201807050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
-&ldquo;Cube&rdquo; 3D printer</strong></del></span> <span 
class="inserted"><ins><em>Jawbone fitness tracker</em></ins></span> was <span 
class="removed"><del><strong>designed with DRM&lt;/a&gt;: it won't accept
-third-party printing materials.  It is</strong></del></span> <span 
class="inserted"><ins><em>tethered to a proprietary phone
-    app.  In 2017,</em></ins></span> the <span 
class="removed"><del><strong>Keurig of printers.  Now it is
-being discontinued, which means that eventually authorized materials won't
-be available</strong></del></span> <span class="inserted"><ins><em>company 
shut down</em></ins></span> and <span 
class="inserted"><ins><em>made</em></ins></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
-
-&lt;p&gt;With a</strong></del></span> <span class="inserted"><ins><em>app stop 
working.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer that gets</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All</em></ins></span>
-    the <span class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, 
this problem would not
-even be</strong></del></span> <span class="inserted"><ins><em>existing 
trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on</em></ins></span> a <span 
class="removed"><del><strong>remote possibility.&lt;/p&gt;
-
-&lt;p&gt;How pitiful</strong></del></span> <span 
class="inserted"><ins><em>further nasty fillip,</em></ins></span> that <span 
class="removed"><del><strong>the author</strong></del></span> <span 
class="inserted"><ins><em>sales</em></ins></span> of <span 
class="inserted"><ins><em>the
-    broken devices continued. But we think</em></ins></span> that <span 
class="removed"><del><strong>article says that there was
-&ldquo;nothing wrong&rdquo; with designing</strong></del></span> <span 
class="inserted"><ins><em>is a secondary issue;
-    it made</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>nasty consequences extend</em></ins></span> to <span 
class="removed"><del><strong>restrict users in</strong></del></span> <span 
class="inserted"><ins><em>some additional people.
+  &lt;li id="M201807050"&gt;
+    &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
+    app.  In 2017,</em></ins></span> the <span 
class="removed"><del><strong>author of that</strong></del></span> <span 
class="inserted"><ins><em>company shut down and made the app stop working. &lt;a
+    
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
+    the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>says</strong></del></span> <span 
class="inserted"><ins><em>focuses on a further nasty fillip,</em></ins></span> 
that <span class="removed"><del><strong>there was
+&ldquo;nothing wrong&rdquo; with designing</strong></del></span> <span 
class="inserted"><ins><em>sales of</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span>
+    <span class="inserted"><ins><em>broken devices continued. But we think 
that is a secondary issue;
+    it made the nasty consequences extend</em></ins></span> to <span 
class="removed"><del><strong>restrict users in</strong></del></span> <span 
class="inserted"><ins><em>some additional people.
     The fundamental wrong was to design</em></ins></span> the <span 
class="removed"><del><strong>first place.  This is like 
putting</strong></del></span> <span class="inserted"><ins><em>devices to depend 
on something
     else that didn't respect users' freedom.&lt;/p&gt;
   &lt;/li&gt;
@@ -491,262 +509,285 @@
 &lt;/p&gt;
 
 &lt;p&gt;That page uses spin terms that favor DRM,
-including &lt;a 
href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
-digital &ldquo;rights&rdquo; management&lt;/a&gt;
-and</strong></del></span> <span class="inserted"><ins><em>lose your internet 
service, you also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
+including</strong></del></span> <span class="inserted"><ins><em>lose your 
internet service, you also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+digital &ldquo;rights&rdquo; management&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control of your house</em></ins></span> and <span 
class="removed"><del><strong>it claims that &ldquo;artists&rdquo; (rather than 
companies) are
-primarily responsible for putting digital restrictions management into
-these disks.  Nonetheless, it is a reference for the facts.
-&lt;/p&gt;
-
-&lt;p&gt;Every Bluray disk (with few, rare exceptions) has 
DRM&mdash;so</strong></del></span> <span 
class="inserted"><ins><em>appliances&lt;/a&gt;.&lt;/p&gt;
+    lose control of your house</em></ins></span> and <span 
class="removed"><del><strong>&lt;a 
href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
 <span class="inserted"><ins><em>appliances&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;For your safety,</em></ins></span> don't use <span 
class="removed"><del><strong>Bluray disks!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>any appliance with a connection to the
-    real internet.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;For your safety, don't use any appliance with a connection to the
+    real internet.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="cameras-bugs"&gt;
-&lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</strong></del></span> <span class="inserted"><ins><em>id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers to be suckers 
and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-security bugs that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;</em></ins></span>
-    allow <span class="removed"><del><strong>anyone</strong></del></span> 
<span class="inserted"><ins><em>delivery staff</em></ins></span> to <span 
class="removed"><del><strong>watch through them&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+  &lt;li id="M201711200"&gt;
+    &lt;p&gt;Amazon recently invited consumers to be suckers</em></ins></span> 
and <span class="removed"><del><strong>it claims that &ldquo;artists&rdquo; 
(rather than companies) are
+primarily responsible for putting digital restrictions management into
+these disks.  Nonetheless, it is a reference for</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
+    it,</em></ins></span> the <span class="removed"><del><strong>facts.
+&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system</em></ins></span> has a <span 
class="removed"><del><strong>big</strong></del></span> <span 
class="inserted"><ins><em>grave</em></ins></span> security <span 
class="removed"><del><strong>hole;</strong></del></span> <span 
class="inserted"><ins><em>flaw.&lt;/p&gt;
+&lt;p&gt;Every Bluray disk (with few, rare exceptions)</strong></del></span> 
<span class="inserted"><ins><em>system</em></ins></span> has <span 
class="removed"><del><strong>DRM&mdash;so
+don't use Bluray disks!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a grave security flaw.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-unauthorized people can remotely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li <span class="removed"><del><strong>id="cameras-bugs"&gt;
+&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings</em></ins></span> of <span 
class="removed"><del><strong>network-connected surveillance cameras 
have</strong></del></span> <span class="inserted"><ins><em>the conversation 
between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711080"&gt;
     &lt;p&gt;Logitech will sabotage
-    all Harmony Link household</em></ins></span> control <span 
class="removed"><del><strong>it&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform 
so</strong></del></span> <span class="inserted"><ins><em>devices by &lt;a
-    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
-    turning off</em></ins></span> the
-<span class="removed"><del><strong>problem is partly</strong></del></span> 
<span class="inserted"><ins><em>server through which</em></ins></span> the 
<span class="removed"><del><strong>fault of app developers. 
That</strong></del></span> <span class="inserted"><ins><em>products' supposed 
owners
+    all Harmony Link household control devices by</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+security bugs</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
+    turning off the server through which the products' supposed owners
     communicate with them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The owners suspect this</em></ins></span> is <span 
class="removed"><del><strong>clearly true if
-the apps</strong></del></span> <span class="inserted"><ins><em>to pressure 
them to buy a newer model. If
-    they</em></ins></span> are <span class="removed"><del><strong>proprietary 
software.&lt;/p&gt;
-
-&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely 
going</strong></del></span> <span class="inserted"><ins><em>wise, they will 
learn, rather,</em></ins></span> to
-<span class="removed"><del><strong>screw you.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>distrust any product that
-    requires users to talk with them through some specialized 
service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The owners suspect this is to pressure them to buy a newer model. 
If
+    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that <span class="removed"><del><strong>allow 
anyone</strong></del></span>
+    <span class="inserted"><ins><em>requires users</em></ins></span> to <span 
class="removed"><del><strong>watch</strong></del></span> <span 
class="inserted"><ins><em>talk with them</em></ins></span> through <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>some specialized 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;
-Malware found on</strong></del></span>
+&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201710040"&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate with it, is a surveillance 
device.</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
-security cameras available through Amazon&lt;/a&gt;.
-&lt;/p&gt;
+    manufacturer can communicate with it, is</em></ins></span> a <span 
class="removed"><del><strong>big security hole;</strong></del></span> <span 
class="inserted"><ins><em>surveillance device.</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;A</strong></del></span>
+&lt;p&gt;Samsung claims that this</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-    Canary</em></ins></span> camera <span class="removed"><del><strong>that 
records locally on physical media, and has no network
-connection, does not threaten people with 
surveillance&mdash;neither</strong></del></span> <span 
class="inserted"><ins><em>is an example&lt;/a&gt;.&lt;/p&gt;
+    Canary camera</em></ins></span> is an <span 
class="removed"><del><strong>&ldquo;open&rdquo; platform 
so</strong></del></span> <span 
class="inserted"><ins><em>example&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article describes wrongdoing</em></ins></span> by <span 
class="removed"><del><strong>watching people through</strong></del></span> the 
<span class="removed"><del><strong>camera, nor through malware 
in</strong></del></span> <span class="inserted"><ins><em>manufacturer, based 
on</em></ins></span>
-    the
-<span class="removed"><del><strong>camera.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</em></ins></span> the
+<span class="removed"><del><strong>problem is partly</strong></del></span> 
<span class="inserted"><ins><em>manufacturer, based on</em></ins></span>
+    the <span class="removed"><del><strong>fault of app developers. That is 
clearly true if</strong></del></span> <span class="inserted"><ins><em>fact 
that</em></ins></span> the <span class="removed"><del><strong>apps are 
proprietary software.&lt;/p&gt;
+
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>device</em></ins></span> is <span 
class="removed"><del><strong>most likely going</strong></del></span> <span 
class="inserted"><ins><em>tethered</em></ins></span> to
+<span class="removed"><del><strong>screw you.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt; &lt;a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-FitBit fitness trackers have a Bluetooth 
vulnerability&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>fact</em></ins></span> that <span 
class="removed"><del><strong>allows
-attackers to send malware to</strong></del></span> the <span 
class="removed"><del><strong>devices, which can subsequently
-spread</strong></del></span> <span class="inserted"><ins><em>device is 
tethered</em></ins></span> to <span class="removed"><del><strong>computers and 
other FitBit trackers</strong></del></span> <span class="inserted"><ins><em>a 
server.&lt;/p&gt;
+&lt;p&gt;
+Malware found on &lt;a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+security cameras available through Amazon&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;A camera</strong></del></span> <span class="inserted"><ins><em>a 
server.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
     proprietary tethering&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;But it also demonstrates</em></ins></span> that <span 
class="removed"><del><strong>interact with
-them.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do</strong></del></span> 
the <span class="removed"><del><strong>encryption with
-proprietary firmware so you can't trust it.  Western Digital's &lt;a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-&ldquo;My Passport&rdquo; drives have a back 
door&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device gives the company
+    &lt;p&gt;But it also demonstrates</em></ins></span> that <span 
class="removed"><del><strong>records locally on physical media, and has no 
network
+connection, does not threaten people with surveillance&mdash;neither
+by watching people through</strong></del></span> the <span 
class="removed"><del><strong>camera, nor through malware 
in</strong></del></span> <span class="inserted"><ins><em>device 
gives</em></ins></span> the
+<span class="removed"><del><strong>camera.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>company
     surveillance capability.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;
-Hospira infusion pumps, which are used to administer drugs to
-a patient, were rated &ldquo;&lt;a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
-least secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
-researcher.&lt;/p&gt;
-
-&lt;p&gt;Depending on what drug</strong></del></span>
+&lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;
     &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
-    designed for hospitals</em></ins></span> is <span 
class="removed"><del><strong>being infused,</strong></del></span> <span 
class="inserted"><ins><em>connected to</em></ins></span> the <span 
class="removed"><del><strong>insecurity could
-open</strong></del></span> <span class="inserted"><ins><em>internet. Naturally 
&lt;a
-    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    designed for hospitals is connected to the internet. 
Naturally</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+FitBit fitness trackers have a Bluetooth 
vulnerability&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>allows
+attackers</strong></del></span> <span class="inserted"><ins><em>this article 
misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring</em></ins></span> to <span 
class="removed"><del><strong>murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    referring</em></ins></span> to <span class="removed"><del><strong>send 
malware</strong></del></span> <span 
class="inserted"><ins><em>crackers.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Due to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
-    &lt;p&gt;The</em></ins></span> bad security in <span 
class="removed"><del><strong>a drug pump, crackers could use it 
to</strong></del></span> <span class="inserted"><ins><em>many Internet of 
Stings devices allows</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
-kill patients&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to <span class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="removed"><del><strong>devices, which can subsequently
+spread to computers and other FitBit trackers</strong></del></span> <span 
class="inserted"><ins><em>people</em></ins></span> that <span 
class="removed"><del><strong>interact with
+them.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
-&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="inserted"><ins><em>snoop on the people that use 
them&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do</strong></del></span> 
<span class="inserted"><ins><em>use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't</em></ins></span> be <span 
class="removed"><del><strong>stupidly vulnerable to
-intrusion.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;The &lt;a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-FTC punished</strong></del></span> a <span 
class="removed"><del><strong>company for making webcams with bad 
security&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all the stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>encryption with
+proprietary firmware so you can't trust it.  Western 
Digital's</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate</em></ins></span> that <span 
class="removed"><del><strong>it was easy for anyone to watch 
them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
article uses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the 
term</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+&ldquo;My Passport&rdquo; drives have a back 
door&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;It is possible</strong></del></span>
+&lt;p&gt;
+Hospira infusion pumps, which are used to administer 
drugs</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201708230"&gt;
     &lt;p&gt;Sonos &lt;a
     
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
     told all its customers, &ldquo;Agree&rdquo;</em></ins></span>
-    to <span class="inserted"><ins><em>snooping or the product will stop 
working&lt;/a&gt;.</em></ins></span>  &lt;a
-<span 
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
-kill</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
-    Another article&lt;/a&gt; says they won't forcibly change the software, 
but</em></ins></span>
-    people <span class="removed"><del><strong>by taking control of medical 
implants by radio&lt;/a&gt;.  More
-information in &lt;a
-href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
-&lt;a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Lots of &lt;a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-hospital equipment has lousy security&lt;/a&gt;, and it 
can</strong></del></span> <span 
class="inserted"><ins><em>won't</em></ins></span> be <span 
class="removed"><del><strong>fatal.&lt;/p&gt;
-&lt;/li&gt;
+    to
+<span class="removed"><del><strong>a patient, were rated &ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
+least secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
+researcher.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-Point-of-sale terminals running Windows were taken 
over&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>able to 
get any upgrades</em></ins></span> and <span class="removed"><del><strong>turned
-into a botnet for the purpose of collecting customers' credit card
-numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>eventually it will
+&lt;p&gt;Depending on what drug is being infused,</strong></del></span> <span 
class="inserted"><ins><em>snooping or</em></ins></span> the <span 
class="removed"><del><strong>insecurity could
+open</strong></del></span> <span class="inserted"><ins><em>product will stop 
working&lt;/a&gt;.  &lt;a
+    
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
+    Another article&lt;/a&gt; says they won't forcibly 
change</em></ins></span> the <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>software, but
+    people won't be able</em></ins></span> to <span 
class="removed"><del><strong>murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>get any upgrades and eventually it will
     stop working.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="vizio-snoop"&gt;
-&lt;p&gt;Vizio
-&lt;a 
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-used</strong></del></span> <span class="inserted"><ins><em>id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>firmware 
&ldquo;upgrade&rdquo;</strong></del></span> <span class="inserted"><ins><em>DJI 
drone</em></ins></span>
-    to <span class="removed"><del><strong>make its TVs</strong></del></span> 
snoop on <span class="removed"><del><strong>what
-users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
-&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Due to bad security in</strong></del></span>
 
-&lt;li&gt;
-&lt;p&gt;LG</strong></del></span> <span class="inserted"><ins><em>other 
people, DJI is in many cases</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-disabled network features&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
-    on <span class="removed"><del><strong>&lt;em&gt;previously 
purchased&lt;/em&gt;
-&ldquo;smart&rdquo; TVs,</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>drug pump, crackers could use 
it</strong></del></span> <span class="inserted"><ins><em>DJI 
drone</em></ins></span>
+    to <span class="inserted"><ins><em>snoop on other people, DJI is in many 
cases</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
+kill patients&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201706200"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201706200"&gt;
     &lt;p&gt;Many models of Internet-connected cameras
     are tremendously insecure.  They have login
-    accounts with hard-coded passwords, which can't be changed, and &lt;a
+    accounts with hard-coded passwords, which can't</em></ins></span> be <span 
class="removed"><del><strong>stupidly vulnerable</strong></del></span> <span 
class="inserted"><ins><em>changed, and &lt;a
     
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
-    is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+    is no way</em></ins></span> to
+<span class="removed"><del><strong>intrusion.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705250"&gt;
-    &lt;p&gt;The proprietary code that runs pacemakers,
-    insulin pumps, and other medical devices is &lt;a
-    href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>proprietary code that runs 
pacemakers,
+    insulin pumps, and other medical devices is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+FTC punished</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full of gross
     security faults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705180"&gt;
     &lt;p&gt;Bird and rabbit pets were implemented for Second
-    Life by a company that tethered their food to a server.  &lt;a
-    
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
-    It shut down the server and the pets more or less died&lt;/a&gt;.&lt;/p&gt;
+    Life by</em></ins></span> a company <span class="removed"><del><strong>for 
making webcams with bad security&lt;/a&gt; so</strong></del></span> that <span 
class="removed"><del><strong>it was easy for anyone to watch them.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>tethered their food</em></ins></span> to <span 
class="inserted"><ins><em>a server.</em></ins></span>  &lt;a
+<span 
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+kill people by taking control of medical implants by radio&lt;/a&gt;.  More
+information in &lt;a
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC 
News&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
+    It shut down the server</em></ins></span> and
+<span class="removed"><del><strong>&lt;a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the pets more or less 
died&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
-    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Lots of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;, and it can be fatal.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows were taken over&lt;/a&gt; and turned
+into</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing</em></ins></span> a <span 
class="removed"><del><strong>botnet</strong></del></span> <span 
class="inserted"><ins><em>spyware app</em></ins></span> for <span 
class="inserted"><ins><em>its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
+    the <span class="removed"><del><strong>purpose</strong></del></span> <span 
class="inserted"><ins><em>app would record the names</em></ins></span> of <span 
class="removed"><del><strong>collecting customers' credit card
+numbers.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li id="vizio-snoop"&gt;
+&lt;p&gt;Vizio
+&lt;a 
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+used a firmware &ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>the audio files users listen</em></ins></span> to 
<span class="removed"><del><strong>make its TVs snoop on 
what</strong></del></span>
+    <span class="inserted"><ins><em>along with the headphone's unique serial 
number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    If the fine print of the app said that</em></ins></span> users <span 
class="removed"><del><strong>watch&lt;/a&gt;.  The TVs did not 
do</strong></del></span> <span class="inserted"><ins><em>gave consent for this,
+    would</em></ins></span> that <span class="removed"><del><strong>when first 
sold.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;LG</strong></del></span> <span class="inserted"><ins><em>make it 
acceptable? No way! It should be flat out</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
+&ldquo;smart&rdquo; TVs, unless the purchasers agreed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>let LG
+begin</strong></del></span> <span class="inserted"><ins><em>design
+    the app</em></ins></span> to snoop <span class="removed"><del><strong>on 
them and distribute their personal data.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704120"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
+Barbie is going</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704120"&gt;
     &lt;p&gt;Anova sabotaged users' cooking devices
-    with a downgrade that tethered them to a remote server. &lt;a
+    with a downgrade that tethered them</em></ins></span> to <span 
class="removed"><del><strong>spy&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>a remote server. &lt;a
     
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/"&gt;Unless
-    users create an account on Anova's servers, their cookers won't
-    function&lt;/a&gt;.&lt;/p&gt;
+    users create an account</em></ins></span> on <span 
class="removed"><del><strong>children and adults.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+Cisco TNP IP phones are spying 
devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Anova's servers, their cookers won't
+    function&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201703270"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.bbc.com/news/technology-34922712"&gt;Nest Cam
+&ldquo;smart&rdquo; camera</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703270"&gt;
     &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher is &lt;a
+    Stings hospital disinfectant dishwasher</em></ins></span> is <span 
class="removed"><del><strong>always watching&lt;/a&gt;, even 
when</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected to the Internet, its security is crap&lt;/a&gt;.&lt;/p&gt;
+    connected to</em></ins></span> the
+<span class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> <span class="inserted"><ins><em>Internet, 
its security</em></ins></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>crap&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For example, a cracker can gain access to the dishwasher's
-    filesystem, infect it with malware, and force the dishwasher to launch
-    attacks on other devices in the network. Since these dishwashers are
+    filesystem, infect</em></ins></span> it <span 
class="inserted"><ins><em>with malware, and force the 
dishwasher</em></ins></span> to <span class="removed"><del><strong>outsmart
+you.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Vizio goes a step further than</strong></del></span> <span 
class="inserted"><ins><em>launch
+    attacks on</em></ins></span> other <span class="removed"><del><strong>TV 
manufacturers</strong></del></span> <span 
class="inserted"><ins><em>devices</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>the network. Since these dishwashers are
     used in hospitals, such attacks could potentially put hundreds of
     lives at risk.&lt;/p&gt;
   &lt;/li&gt;
@@ -754,19 +795,20 @@
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping</em></ins></span> on <span class="inserted"><ins><em>its 
users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
-    products, rather than free software which users could have checked
+    standard with which manufacturers would make statements 
about</em></ins></span> their <span class="removed"><del><strong>users: 
their</strong></del></span>
+    <span class="inserted"><ins><em>products, rather than free software which 
users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
@@ -783,19 +825,29 @@
 
   &lt;li id="M201703070"&gt;
     &lt;p&gt;The CIA exploited existing vulnerabilities
-    in &ldquo;smart&rdquo; TVs and phones to design a malware that &lt;a
+    in</em></ins></span> &ldquo;smart&rdquo; TVs <span 
class="removed"><del><strong>analyze your viewing habits in 
detail</strong></del></span> and 
+<span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>phones to design a 
malware</em></ins></span> that <span class="removed"><del><strong>advertisers 
can track you 
+across devices.&lt;/p&gt;
+
+&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"&gt;
-    spies through their microphones and cameras while making them appear
-    to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
-    encryption.&lt;/p&gt;
+    spies through their microphones and cameras while making them 
appear</em></ins></span>
+    to <span class="removed"><del><strong>turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>be turned 
off&lt;/a&gt;. Since the spyware sniffs signals,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default
+is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>bypasses
+    encryption.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Tivo's alliance</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>microphones 
&lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    leak childrens' conversations</em></ins></span> to the <span 
class="removed"><del><strong>600
+millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>company already monitors.  Tivo
+customers</strong></del></span> <span class="inserted"><ins><em>data&lt;/a&gt; 
collected by the
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
@@ -1109,16 +1161,24 @@
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by advertisers.  By
+combining</strong></del></span> <span class="inserted"><ins><em>totally 
inadequate.
+    And what happens if a user declines consent? Probably 
the</em></ins></span> TV <span class="removed"><del><strong>viewing information 
with online social media
+participation, Tivo can now &lt;a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+correlate</strong></del></span> <span class="inserted"><ins><em>will
+    say, &ldquo;Without your consent to tracking, the</em></ins></span> TV 
<span class="removed"><del><strong>advertisement with online 
purchases&lt;/a&gt;, exposing all
+users</strong></del></span> <span class="inserted"><ins><em>will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>report 
what the
+    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407170"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Some web</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
     &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
@@ -1128,84 +1188,40 @@
     &lt;p&gt;LG &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
-    &ldquo;smart&rdquo; TVs,</em></ins></span> unless the purchasers agreed to 
let LG begin
-    to snoop on them and distribute their personal data.&lt;/p&gt;
+    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
+    to snoop on them</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>distribute their 
personal data.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
-Barbie is going to spy&lt;/a&gt; on children</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
+  &lt;li id="M201404250"&gt;
     &lt;p&gt;Lots of &lt;a
     href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-    hospital equipment has lousy security&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>adults.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>it can be fatal.&lt;/p&gt;</em></ins></span>
+    hospital equipment has lousy security&lt;/a&gt;, and it can be 
fatal.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a
-<span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-Cisco TNP IP phones are spying devices&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;The &lt;a
-href="http://www.bbc.com/news/technology-34922712"&gt;Nest Cam
-&ldquo;smart&rdquo; camera is always watching&lt;/a&gt;, even when the
-&ldquo;owner&rdquo; switches</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.bunniestudios.com/blog/?p=3554"&gt; 
Some flash
+  &lt;li id="M201312290"&gt;
+    &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
     memories have modifiable software&lt;/a&gt;, which makes them vulnerable
     to viruses.&lt;/p&gt;
 
-    &lt;p&gt;We don't call this a &ldquo;back door&rdquo; 
because</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-
-&lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>normal
+    &lt;p&gt;We don't call this a &ldquo;back door&rdquo; because it is normal
     that you can install a new system in a computer, given physical 
access</em></ins></span>
-    to <span class="removed"><del><strong>outsmart
-you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>it.  
However, memory sticks and cards should not be modifiable in
-    this way.&lt;/p&gt;</em></ins></span>
+    to <span class="inserted"><ins><em>it.  However, memory sticks and cards 
should not</em></ins></span> be <span class="removed"><del><strong>picked
+up by proprietary malware</strong></del></span> <span 
class="inserted"><ins><em>modifiable in
+    this way.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Vizio goes</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312040"&gt;
+  &lt;li id="M201312040"&gt;
     &lt;p&gt;&lt;a
     
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-    Point-of-sale terminals running Windows were taken over&lt;/a&gt; and
-    turned into</em></ins></span> a <span class="removed"><del><strong>step 
further than other TV manufacturers</strong></del></span> <span 
class="inserted"><ins><em>botnet for the purpose of collecting customers' credit
+    Point-of-sale terminals</em></ins></span> running <span 
class="inserted"><ins><em>Windows were taken over&lt;/a&gt; and
+    turned into a botnet for the purpose of collecting customers' credit
     card numbers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311210"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>spying on 
-their users: their &lt;a
-href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>LG</em></ins></span> &ldquo;smart&rdquo; TVs 
<span class="removed"><del><strong>analyze your viewing habits in 
detail</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and 
-<span class="removed"><del><strong>link them your IP address&lt;/a&gt; so that 
advertisers can track you 
-across devices.&lt;/p&gt;
-
-&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the switch</em></ins></span> to turn this <span 
class="removed"><del><strong>off, but having it enabled by default
-is an injustice already.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to the 600
-millions social media profiles the company already monitors.  Tivo
-customers are unaware they're being watched by advertisers.  By
-combining TV viewing information with online social media
-participation, Tivo can now &lt;a
-href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-users to new combined surveillance by default.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Some web and TV advertisements play inaudible sounds to be picked
-up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>off has
+    reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
@@ -1417,7 +1433,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/07 07:00:04 $
+$Date: 2020/06/13 10:00:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- malware-appliances.de.po    7 Jun 2020 07:00:05 -0000       1.88
+++ malware-appliances.de.po    13 Jun 2020 10:00:27 -0000      1.89
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -140,6 +140,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: malware-appliances.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-appliances.es.po    8 Jun 2020 09:12:01 -0000       1.19
+++ malware-appliances.es.po    13 Jun 2020 10:00:27 -0000      1.20
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-06-08 10:59+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -128,6 +129,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- malware-appliances.fr.po    7 Jun 2020 07:13:19 -0000       1.148
+++ malware-appliances.fr.po    13 Jun 2020 10:00:27 -0000      1.149
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-06-07 09:09+0200\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -125,6 +126,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- malware-appliances.pot      7 Jun 2020 07:00:05 -0000       1.73
+++ malware-appliances.pot      13 Jun 2020 10:00:27 -0000      1.74
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -90,6 +90,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a "
+"href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\";>
 "
+"shut down the service to control them through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a "
 "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
 "company made them all cease to work</a> by shutting down that server."

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- malware-appliances.ru.po    7 Jun 2020 17:00:51 -0000       1.184
+++ malware-appliances.ru.po    13 Jun 2020 10:00:27 -0000      1.185
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -126,6 +127,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- nl.po       7 Jun 2020 07:00:07 -0000       1.184
+++ nl.po       13 Jun 2020 10:00:27 -0000      1.185
@@ -2098,6 +2098,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- pl.po       7 Jun 2020 07:00:07 -0000       1.183
+++ pl.po       13 Jun 2020 10:00:27 -0000      1.184
@@ -1667,6 +1667,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- pot 7 Jun 2020 07:00:07 -0000       1.182
+++ pot 13 Jun 2020 10:00:27 -0000      1.183
@@ -1476,6 +1476,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-tethers.de-diff.html    7 Jun 2020 07:00:07 -0000       1.26
+++ proprietary-tethers.de-diff.html    13 Jun 2020 10:00:27 -0000      1.27
@@ -72,45 +72,59 @@
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to <span class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
+to <span class="removed"><del><strong>present the specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+
+&lt;li&gt;
+&lt;p&gt;The game Metal Gear Rising for MacOS was</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="proprietary-tethers"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202005070"&gt;
-    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
-    to a server. In May 2020, it ordered the purchasers to start &lt;a
-    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
-    paying a monthly fee for</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>use of that 
server&lt;/a&gt;.  Because of the
+    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that 
is</em></ins></span> tethered
+    to a server.
+<span class="removed"><del><strong>The company</strong></del></span> <span 
class="inserted"><ins><em>In May 2020, it ordered the purchasers to 
start</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"&gt;
+    paying a monthly fee for the use of that server&lt;/a&gt;.  Because of the
     tethering, the hub is useless without that.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201904260"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>game Metal Gear 
Rising</strong></del></span> <span class="inserted"><ins><em>Jibo robot toys 
were tethered to the manufacturer's server,
-    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
-    the company made them all cease to work&lt;/a&gt; by shutting down that
+  &lt;li id="M201909061"&gt;
+    &lt;p&gt;Best Buy made controllable appliances and &lt;a
+    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;</em></ins></span>
+    shut down the <span class="inserted"><ins><em>service to control them 
through&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
+    the customers by doing so, this doesn't alter the facts that
+    tethering the device to a particular server is a path to screwing the
+    users, and that it is a consequence of having nonfree software in the
+    device.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to the 
manufacturer's</em></ins></span> server,
+    and <span class="inserted"><ins><em>&lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
+    the company made them</em></ins></span> all <span 
class="removed"><del><strong>copies stopped 
working&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cease to work&lt;/a&gt; by shutting down that
     server.&lt;/p&gt;
 
-    &lt;p&gt;The shutdown might ironically be good</em></ins></span> for <span 
class="removed"><del><strong>MacOS</strong></del></span> <span 
class="inserted"><ins><em>their users, since the
-    product</em></ins></span> was <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="inserted"><ins><em>manipulate people by presenting</em></ins></span> a 
<span class="removed"><del><strong>server.
-The company</strong></del></span> <span class="inserted"><ins><em>phony
-    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+    &lt;p&gt;The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on 
them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904040"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904040"&gt;
     &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
     their DRM is valid by connecting to the store every time their
     &ldquo;owner&rdquo; wants to read them. Microsoft is going to close
-    this store,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;
-shut down</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.bbc.com/news/technology-47810367"&gt;
+    this store, &lt;a href="https://www.bbc.com/news/technology-47810367"&gt;
     bricking all DRM'ed ebooks it has ever &ldquo;sold&rdquo;&lt;/a&gt;. (The
-    article additionally highlights</em></ins></span> the <span 
class="removed"><del><strong>server,</strong></del></span> <span 
class="inserted"><ins><em>pitfalls of DRM.)&lt;/p&gt;
+    article additionally highlights the pitfalls of DRM.)&lt;/p&gt;
 
     &lt;p&gt;This is another proof that a DRM-encumbered product doesn't belong
     to the person who bought it. Microsoft said it will refund customers,
@@ -130,18 +144,16 @@
     only through the company's server. They have
     all the nasty characteristics of such devices: &lt;a
     
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance,</em></ins></span> and <span class="inserted"><ins><em>danger 
of sabotage&lt;/a&gt; (of a specific user, or of</em></ins></span>
-    all <span class="removed"><del><strong>copies stopped 
working&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users at once), as well as the risk of an outage 
(which is what
+    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
+    all users at once), as well as the risk of an outage (which is what
     just happened).&lt;/p&gt;
 
     &lt;p&gt;In addition, setting the desired temperature requires running
     nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;</em></ins></span>
+    using controls right on the thermostat.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201807050"&gt;</em></ins></span>
+  &lt;li id="M201807050"&gt;</em></ins></span>
     &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
     app.  In 2017, the company shut down and made the app stop working. &lt;a
     
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
@@ -351,7 +363,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/07 07:00:07 $
+$Date: 2020/06/13 10:00:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary-tethers.de.po   7 Jun 2020 07:00:07 -0000       1.38
+++ proprietary-tethers.de.po   13 Jun 2020 10:00:27 -0000      1.39
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -140,6 +140,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: proprietary-tethers.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.es.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary-tethers.es.po   8 Jun 2020 09:12:01 -0000       1.13
+++ proprietary-tethers.es.po   13 Jun 2020 10:00:27 -0000      1.14
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-06-08 11:00+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -110,6 +111,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-tethers.fr.po   7 Jun 2020 07:13:19 -0000       1.70
+++ proprietary-tethers.fr.po   13 Jun 2020 10:00:27 -0000      1.71
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-06-07 09:09+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -105,6 +106,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary-tethers.ja-diff.html    7 Jun 2020 07:00:07 -0000       1.45
+++ proprietary-tethers.ja-diff.html    13 Jun 2020 10:00:27 -0000      1.46
@@ -86,6 +86,18 @@
     tethering, the hub is useless without that.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M201909061"&gt;
+    &lt;p&gt;Best Buy made controllable appliances and &lt;a
+    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
+    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
+    the customers by doing so, this doesn't alter the facts that
+    tethering the device to a particular server is a path to screwing the
+    users, and that it is a consequence of having nonfree software in the
+    device.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904260"&gt;
     &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
     and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
@@ -333,7 +345,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/07 07:00:07 $
+$Date: 2020/06/13 10:00:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-tethers.ja.po   7 Jun 2020 07:00:07 -0000       1.37
+++ proprietary-tethers.ja.po   13 Jun 2020 10:00:27 -0000      1.38
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -104,6 +104,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-tethers.pot     7 Jun 2020 07:00:09 -0000       1.34
+++ proprietary-tethers.pot     13 Jun 2020 10:00:27 -0000      1.35
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -79,6 +79,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a "
+"href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\";>
 "
+"shut down the service to control them through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a "
 "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
 "company made them all cease to work</a> by shutting down that server."

Index: proprietary-tethers.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-tethers.pt-br.po        7 Jun 2020 07:00:09 -0000       1.22
+++ proprietary-tethers.pt-br.po        13 Jun 2020 10:00:27 -0000      1.23
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2019-11-26 22:50-0200\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -100,6 +100,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary-tethers.ru.po   7 Jun 2020 17:00:51 -0000       1.77
+++ proprietary-tethers.ru.po   13 Jun 2020 10:00:27 -0000      1.78
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -106,6 +107,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary.de-diff.html    7 Jun 2020 07:00:09 -0000       1.153
+++ proprietary.de-diff.html    13 Jun 2020 10:00:27 -0000      1.154
@@ -27,8 +27,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -57,10 +57,10 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -127,16 +127,16 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -153,19 +153,19 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -188,10 +188,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -212,6 +212,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909061"&gt;
+    &lt;p&gt;Best Buy made controllable appliances and &lt;a
+    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
+    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
+    the customers by doing so, this doesn't alter the facts that
+    tethering the device to a particular server is a path to screwing the
+    users, and that it is a consequence of having nonfree software in the
+    device.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005070"&gt;
     &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
     to a server. In May 2020, it ordered the purchasers to start &lt;a
@@ -260,15 +272,6 @@
     treatment is equivalent to actually doing it.  Whatever condemnation
     the latter deserves, the former deserves the same.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201703070"&gt;
-    &lt;p&gt;The CIA exploited existing vulnerabilities
-    in &ldquo;smart&rdquo; TVs and phones to design a malware that &lt;a
-    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"&gt;
-    spies through their microphones and cameras while making them appear
-    to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
-    encryption.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -331,7 +334,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.de.po   7 Jun 2020 07:00:09 -0000       1.194
+++ proprietary.de.po   13 Jun 2020 10:00:27 -0000      1.195
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -517,16 +533,6 @@
 "deserves the same."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- proprietary.es.po   8 Jun 2020 09:12:01 -0000       1.271
+++ proprietary.es.po   13 Jun 2020 10:00:27 -0000      1.272
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -312,6 +313,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -410,23 +427,6 @@
 "de vista ético, exigir por adelantado que se acepte un mal trato equivale a "
 "infligirlo. Si esto merece alguna condena, aquello merece la misma."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"La CIA aprovechó vulnerabilidades existentes en teléfonos y televisores "
-"«inteligentes» para diseñar un software malicioso capaz de <a 
href=\"https://";
-"www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-"
-"android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"
-"\">espiar mediante sus micrófonos y cámaras mientras parecían estar "
-"apagados</a>. Puesto que este software espía capta las señales, sortea el "
-"encriptado."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -504,6 +504,22 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/";
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "La CIA aprovechó vulnerabilidades existentes en teléfonos y televisores "
+#~ "«inteligentes» para diseñar un software malicioso capaz de <a href="
+#~ "\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/";
+#~ "wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
+#~ "assange-a7616651.html\">espiar mediante sus micrófonos y cámaras 
mientras "
+#~ "parecían estar apagados</a>. Puesto que este software espía capta las "
+#~ "señales, sortea el encriptado."
+
+#~ msgid ""
 #~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 #~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 #~ "surveillance.html\"> tells the cops directly</a>."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- proprietary.fr.po   7 Jun 2020 07:13:19 -0000       1.319
+++ proprietary.fr.po   13 Jun 2020 10:00:27 -0000      1.320
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-06-07 09:09+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -308,6 +309,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -405,22 +422,6 @@
 "que les gens acceptent par avance un mauvais traitement est équivalent à le 
"
 "leur infliger. Cela mérite la même condamnation que le traitement 
lui-même."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"La CIA a exploité des vulnérabilités présentes dans les téléviseurs et "
-"téléphones « intelligents » pour fabriquer un logiciel malveillant qui 
<a "
-"href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/";
-"wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-"
-"a7616651.html\">se sert de leur micro et de leur caméra pour espionner, tout 
"
-"en les faisant paraître inactifs</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -495,6 +496,21 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/";
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "La CIA a exploité des vulnérabilités présentes dans les téléviseurs 
et "
+#~ "téléphones « intelligents » pour fabriquer un logiciel malveillant 
qui <a "
+#~ "href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/";
+#~ "wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
+#~ "assange-a7616651.html\">se sert de leur micro et de leur caméra pour "
+#~ "espionner, tout en les faisant paraître inactifs</a>."
+
+#~ msgid ""
 #~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 #~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 #~ "surveillance.html\"> tells the cops directly</a>."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary.it-diff.html    7 Jun 2020 07:00:09 -0000       1.165
+++ proprietary.it-diff.html    13 Jun 2020 10:00:27 -0000      1.166
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -65,13 +65,13 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,6 +211,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909061"&gt;
+    &lt;p&gt;Best Buy made controllable appliances and &lt;a
+    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
+    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
+    the customers by doing so, this doesn't alter the facts that
+    tethering the device to a particular server is a path to screwing the
+    users, and that it is a consequence of having nonfree software in the
+    device.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005070"&gt;
     &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
     to a server. In May 2020, it ordered the purchasers to start &lt;a
@@ -259,15 +271,6 @@
     treatment is equivalent to actually doing it.  Whatever condemnation
     the latter deserves, the former deserves the same.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201703070"&gt;
-    &lt;p&gt;The CIA exploited existing vulnerabilities
-    in &ldquo;smart&rdquo; TVs and phones to design a malware that &lt;a
-    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"&gt;
-    spies through their microphones and cameras while making them appear
-    to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
-    encryption.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -330,7 +333,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary.it.po   7 Jun 2020 07:00:09 -0000       1.203
+++ proprietary.it.po   13 Jun 2020 10:00:27 -0000      1.204
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -521,16 +537,6 @@
 "deserves the same."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary.ja-diff.html    7 Jun 2020 07:00:09 -0000       1.169
+++ proprietary.ja-diff.html    13 Jun 2020 10:00:27 -0000      1.170
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -62,8 +62,8 @@
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -186,10 +186,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -209,6 +209,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909061"&gt;
+    &lt;p&gt;Best Buy made controllable appliances and &lt;a
+    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
+    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
+    the customers by doing so, this doesn't alter the facts that
+    tethering the device to a particular server is a path to screwing the
+    users, and that it is a consequence of having nonfree software in the
+    device.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005070"&gt;
     &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
     to a server. In May 2020, it ordered the purchasers to start &lt;a
@@ -257,15 +269,6 @@
     treatment is equivalent to actually doing it.  Whatever condemnation
     the latter deserves, the former deserves the same.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201703070"&gt;
-    &lt;p&gt;The CIA exploited existing vulnerabilities
-    in &ldquo;smart&rdquo; TVs and phones to design a malware that &lt;a
-    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"&gt;
-    spies through their microphones and cameras while making them appear
-    to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
-    encryption.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -328,7 +331,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary.ja.po   7 Jun 2020 07:00:09 -0000       1.187
+++ proprietary.ja.po   13 Jun 2020 10:00:27 -0000      1.188
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -382,16 +398,6 @@
 "deserves the same."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary.nl-diff.html    7 Jun 2020 07:00:09 -0000       1.166
+++ proprietary.nl-diff.html    13 Jun 2020 10:00:27 -0000      1.167
@@ -27,8 +27,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -57,17 +57,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -211,6 +211,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909061"&gt;
+    &lt;p&gt;Best Buy made controllable appliances and &lt;a
+    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
+    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
+    the customers by doing so, this doesn't alter the facts that
+    tethering the device to a particular server is a path to screwing the
+    users, and that it is a consequence of having nonfree software in the
+    device.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005070"&gt;
     &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
     to a server. In May 2020, it ordered the purchasers to start &lt;a
@@ -259,15 +271,6 @@
     treatment is equivalent to actually doing it.  Whatever condemnation
     the latter deserves, the former deserves the same.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201703070"&gt;
-    &lt;p&gt;The CIA exploited existing vulnerabilities
-    in &ldquo;smart&rdquo; TVs and phones to design a malware that &lt;a
-    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"&gt;
-    spies through their microphones and cameras while making them appear
-    to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
-    encryption.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -330,7 +333,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- proprietary.nl.po   7 Jun 2020 07:00:09 -0000       1.177
+++ proprietary.nl.po   13 Jun 2020 10:00:27 -0000      1.178
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -363,6 +363,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -425,16 +441,6 @@
 "deserves the same."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary.pl-diff.html    7 Jun 2020 07:00:09 -0000       1.183
+++ proprietary.pl-diff.html    13 Jun 2020 10:00:27 -0000      1.184
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -56,13 +56,13 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
+#TOC a { text-decoration: none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -114,8 +114,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As of January, 2020, the pages in this directory list around 450
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 500 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>January, 2020, the pages in this directory 
list around 450
+instances of malicious functionalities (with more than 500 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -209,6 +209,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909061"&gt;
+    &lt;p&gt;Best Buy made controllable appliances and &lt;a
+    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
+    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
+    the customers by doing so, this doesn't alter the facts that
+    tethering the device to a particular server is a path to screwing the
+    users, and that it is a consequence of having nonfree software in the
+    device.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005070"&gt;
     &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
     to a server. In May 2020, it ordered the purchasers to start &lt;a
@@ -257,15 +269,6 @@
     treatment is equivalent to actually doing it.  Whatever condemnation
     the latter deserves, the former deserves the same.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201703070"&gt;
-    &lt;p&gt;The CIA exploited existing vulnerabilities
-    in &ldquo;smart&rdquo; TVs and phones to design a malware that &lt;a
-    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"&gt;
-    spies through their microphones and cameras while making them appear
-    to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
-    encryption.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -328,7 +331,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.pl.po   7 Jun 2020 07:00:09 -0000       1.170
+++ proprietary.pl.po   13 Jun 2020 10:00:27 -0000      1.171
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -540,6 +540,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -602,16 +618,6 @@
 "deserves the same."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.pot     7 Jun 2020 07:00:09 -0000       1.167
+++ proprietary.pot     13 Jun 2020 10:00:27 -0000      1.168
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -257,6 +257,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a "
+"href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\";>
 "
+"shut down the service to control them through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a "
 
"href=\"https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html\";>
 "
@@ -320,15 +335,6 @@
 "deserves the same."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a "
-"href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html\";>
 "
-"spies through their microphones and cameras while making them appear to be "
-"turned off</a>. Since the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- proprietary.pt-br.po        7 Jun 2020 07:00:09 -0000       1.294
+++ proprietary.pt-br.po        13 Jun 2020 10:00:27 -0000      1.295
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-05-26 10:33-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -306,6 +306,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -398,22 +414,6 @@
 "equivalente a realmente fazê-lo. Qualquer que seja a condenação que o 
último "
 "mereça, o primeiro merece o mesmo."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"A CIA explorou as vulnerabilidades existentes em TVs e telefones "
-"“inteligentes” para projetar um malware que <a href=\"https://www.";
-"independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-"
-"iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html\"> espia "
-"através de seus microfones e câmeras enquanto os faz parecer 
desligados</a>. "
-"Como o spyware detecta sinais, ignora a criptografia."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -489,6 +489,21 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/";
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "A CIA explorou as vulnerabilidades existentes em TVs e telefones "
+#~ "“inteligentes” para projetar um malware que <a href=\"https://www.";
+#~ "independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-"
+#~ "android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"
+#~ "\"> espia através de seus microfones e câmeras enquanto os faz parecer "
+#~ "desligados</a>. Como o spyware detecta sinais, ignora a criptografia."
+
+#~ msgid ""
 #~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 #~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 #~ "surveillance.html\"> tells the cops directly</a>."

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.353
retrieving revision 1.354
diff -u -b -r1.353 -r1.354
--- proprietary.ru.po   7 Jun 2020 17:00:51 -0000       1.353
+++ proprietary.ru.po   13 Jun 2020 10:00:27 -0000      1.354
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -312,6 +313,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -410,23 +427,6 @@
 "обращение эквивалентно такому обращению. 
Если последнее заслуживает "
 "осуждения, то и первое заслуживает такого 
же осуждения."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"ЦРУ использовало существующие уязвимости 
в &ldquo;умных&rdquo; телевизорах и "
-"телефонах, чтобы составить вредоносную 
программу, которая <a href=\"https://";
-"www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-"
-"android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html\"> "
-"шпионит через их микрофоны и камеры, 
причем они выглядят так, как будто они "
-"выключены</a>. Поскольку шпионская 
программа перехватывает сигналы, "
-"шифрование от этого не защищает."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -503,6 +503,22 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/";
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "ЦРУ использовало существующие 
уязвимости в &ldquo;умных&rdquo; "
+#~ "телевизорах и телефонах, чтобы 
составить вредоносную программу, которая "
+#~ "<a href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/";
+#~ "wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
+#~ "assange-a7616651.html\"> шпионит через их микрофоны 
и камеры, причем они "
+#~ "выглядят так, как будто они выключены</a>. 
Поскольку шпионская программа "
+#~ "перехватывает сигналы, шифрование от 
этого не защищает."
+
+#~ msgid ""
 #~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 #~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 #~ "surveillance.html\"> tells the cops directly</a>."

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary.tr.po   7 Jun 2020 09:40:02 -0000       1.22
+++ proprietary.tr.po   13 Jun 2020 10:00:27 -0000      1.23
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-06-07 11:38+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.3\n"
 
@@ -305,6 +306,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -404,22 +421,6 @@
 "etmek, kötü muamele etmekle eşdeğerdir. İkinci durumun hak ettiği 
kınamanın "
 "aynısını ilk durum da hak eder."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"CIA, <a href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/";
-"news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
-"assange-a7616651.html\">kapalı gözükmesini sağladığı halde mikrofon ve 
"
-"kameralar aracılığıyla casusluk</a> yapan kötücül bir yazılım 
tasarlamak "
-"için &ldquo;akıllı&rdquo; TV ve telefonlardaki mevcut açıkları istismar 
"
-"etti. Casus yazılım sinyalleri yakaladığı için şifrelemeyi es 
geçiyor."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -500,6 +501,21 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/";
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "CIA, <a href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/";
+#~ "news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
+#~ "assange-a7616651.html\">kapalı gözükmesini sağladığı halde mikrofon 
ve "
+#~ "kameralar aracılığıyla casusluk</a> yapan kötücül bir yazılım 
tasarlamak "
+#~ "için &ldquo;akıllı&rdquo; TV ve telefonlardaki mevcut açıkları 
istismar "
+#~ "etti. Casus yazılım sinyalleri yakaladığı için şifrelemeyi es 
geçiyor."
+
+#~ msgid ""
 #~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 #~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 #~ "surveillance.html\"> tells the cops directly</a>."

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary.zh-cn.po        8 Jun 2020 01:28:32 -0000       1.14
+++ proprietary.zh-cn.po        13 Jun 2020 10:00:27 -0000      1.15
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-06-08 09:11+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -288,6 +289,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -374,21 +391,6 @@
 "要的问题。从道义上说,要求人们先接受某个恶意对待
和对人实施恶意对待是等价的。"
 "对后者的所有谴责,放在前者身上也是一样的。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"中央情
报局利用&ldquo;智能电视&rdquo;和电话的已有漏洞设计了一种恶意软件,<a
 "
-"href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/";
-"wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-"
-"a7616651.html\">通过麦å…
‹é£Žå’Œæ‘„像头进行间谍活动,同时看上去又像是处于关闭状态"
-"</a>。由于间谍软件会嗅探信号,绕过了加密。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -466,6 +468,20 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/";
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "中央情
报局利用&ldquo;智能电视&rdquo;和电话的已有漏洞设计了一种恶意软件,"
+#~ "<a href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/";
+#~ "wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
+#~ "assange-a7616651.html\">通过麦å…
‹é£Žå’Œæ‘„像头进行间谍活动,同时看上去又像是处"
+#~ "于关闭状态</a>。由于间谍软件会嗅探信号,绕过了加
密。"
+
+#~ msgid ""
 #~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 #~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 #~ "surveillance.html\"> tells the cops directly</a>."

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.zh-tw-diff.html 7 Jun 2020 07:00:09 -0000       1.146
+++ proprietary.zh-tw-diff.html 13 Jun 2020 10:00:27 -0000      1.147
@@ -27,8 +27,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -57,10 +57,10 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -127,16 +127,16 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -153,19 +153,19 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -188,10 +188,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -212,6 +212,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201909061"&gt;
+    &lt;p&gt;Best Buy made controllable appliances and &lt;a
+    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
+    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
+    the customers by doing so, this doesn't alter the facts that
+    tethering the device to a particular server is a path to screwing the
+    users, and that it is a consequence of having nonfree software in the
+    device.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202005070"&gt;
     &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that is tethered
     to a server. In May 2020, it ordered the purchasers to start &lt;a
@@ -260,15 +272,6 @@
     treatment is equivalent to actually doing it.  Whatever condemnation
     the latter deserves, the former deserves the same.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201703070"&gt;
-    &lt;p&gt;The CIA exploited existing vulnerabilities
-    in &ldquo;smart&rdquo; TVs and phones to design a malware that &lt;a
-    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"&gt;
-    spies through their microphones and cameras while making them appear
-    to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
-    encryption.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -331,7 +334,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- proprietary.zh-tw.po        7 Jun 2020 07:00:09 -0000       1.157
+++ proprietary.zh-tw.po        13 Jun 2020 10:00:27 -0000      1.158
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -433,6 +433,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In "
 "May 2020, it ordered the purchasers to start <a href=\"https://www.techhive.";
 "com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -495,16 +511,6 @@
 "deserves the same."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-";
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- pt-br.po    7 Jun 2020 07:00:09 -0000       1.243
+++ pt-br.po    13 Jun 2020 10:00:27 -0000      1.244
@@ -1847,6 +1847,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.406
retrieving revision 1.407
diff -u -b -r1.406 -r1.407
--- ru.po       7 Jun 2020 16:54:17 -0000       1.406
+++ ru.po       13 Jun 2020 10:00:27 -0000      1.407
@@ -2126,11 +2126,11 @@
 "subscription-model.html\"> paying a monthly fee for the use of that server</"
 "a>.  Because of the tethering, the hub is useless without that."
 msgstr ""
-"Компания Wink продает узел &ldquo;умного&rdquo; 
дома, привязанный к серверу. В "
-"мае 2020&nbsp;года компания велела 
покупателям начать <a href=\"https://www.techhive.";
-"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
-"subscription-model.html\"> вносить ежемесячную плату 
за пользование этим сервером</a>. "
-"Из-за привязки узел без этого не работает."
+"Компания Wink продает узел &ldquo;умного&rdquo; 
дома, привязанный к серверу. "
+"В мае 2020&nbsp;года компания велела 
покупателям начать <a href=\"https://";
+"www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-"
+"shift-to-a-subscription-model.html\"> вносить ежемесячную 
плату за "
+"пользование этим сервером</a>. Из-за 
привязки узел без этого не работает."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -2161,6 +2161,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- tr.po       7 Jun 2020 09:59:16 -0000       1.15
+++ tr.po       13 Jun 2020 10:00:27 -0000      1.16
@@ -1615,6 +1615,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- zh-cn.po    8 Jun 2020 01:28:32 -0000       1.11
+++ zh-cn.po    13 Jun 2020 10:00:28 -0000      1.12
@@ -1586,6 +1586,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- zh-tw.po    7 Jun 2020 07:00:09 -0000       1.183
+++ zh-tw.po    13 Jun 2020 10:00:28 -0000      1.184
@@ -1664,6 +1664,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Jibo robot toys were tethered to the manufacturer's server, and <a href="
 "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
 "made them all cease to work</a> by shutting down that server."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]