www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Thu, 25 Jun 2020 19:01:28 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/06/25 19:01:27

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.es.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.506&r2=1.507
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.602&r2=1.603
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.323&r2=1.324
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.189&r2=1.190
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.357&r2=1.358
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.412&r2=1.413
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.186&r2=1.187

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- de.po       24 Jun 2020 05:37:08 -0000      1.186
+++ de.po       25 Jun 2020 23:01:25 -0000      1.187
@@ -2592,6 +2592,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- es.po       24 Jun 2020 09:29:40 -0000      1.268
+++ es.po       25 Jun 2020 23:01:25 -0000      1.269
@@ -2418,6 +2418,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- fr.po       24 Jun 2020 05:37:09 -0000      1.326
+++ fr.po       25 Jun 2020 23:01:25 -0000      1.327
@@ -2128,6 +2128,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- it.po       24 Jun 2020 05:37:09 -0000      1.186
+++ it.po       25 Jun 2020 23:01:25 -0000      1.187
@@ -2528,6 +2528,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- ja.po       24 Jun 2020 05:37:09 -0000      1.194
+++ ja.po       25 Jun 2020 23:01:25 -0000      1.195
@@ -1936,6 +1936,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-appliances.de-diff.html     24 Jun 2020 05:37:09 -0000      1.57
+++ malware-appliances.de-diff.html     25 Jun 2020 23:01:26 -0000      1.58
@@ -98,33 +98,41 @@
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or 
two</em></ins></span>
-to <span class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span> <span class="inserted"><ins><em>serve as 
specific substantiation.&lt;/p&gt;
+    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="malware-appliances"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202006160"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous security bug&lt;/a&gt; touches millions</em></ins></span> of 
<span class="inserted"><ins><em>products in</em></ins></span> the <span 
class="removed"><del><strong>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able</em></ins></span> to <span 
class="removed"><del><strong>make</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second</em></ins></span> of <span 
class="inserted"><ins><em>what</em></ins></span> the <span 
class="removed"><del><strong>conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
-      is</strong></del></span>
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>a surveillance device. &lt;a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+       Canary camera</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;. This</em></ins></span> is <span 
class="removed"><del><strong>an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>illegal due to</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer, based 
on</strong></del></span> <span class="inserted"><ins><em>Video Privacy 
Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006160"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
+    A disasterous security bug&lt;/a&gt; touches millions of products 
in</em></ins></span> the <span class="removed"><del><strong>fact
+      that</strong></del></span>
     <span class="inserted"><ins><em>Internet of Stings.&lt;/p&gt;
 
-    &lt;p&gt;As</em></ins></span> a <span 
class="removed"><del><strong>surveillance device. &lt;a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>result, anyone can sting</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>user, not only</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer.&lt;/p&gt;
+    &lt;p&gt;As a result, anyone can sting</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>user, not only the
+    manufacturer.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202005070"&gt;
-    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub</em></ins></span> that 
<span class="removed"><del><strong>the device</strong></del></span> is tethered
+    &lt;p&gt;Wink sells a &ldquo;smart&rdquo; home hub that</em></ins></span> 
is tethered
     to a <span class="removed"><del><strong>server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
     &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>server. 
In May 2020,</em></ins></span> it <span class="removed"><del><strong>also 
demonstrates</strong></del></span> <span class="inserted"><ins><em>ordered the 
purchasers to start &lt;a
@@ -136,19 +144,20 @@
   
 &lt;li&gt;
   &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
-    hospitals</strong></del></span> <span 
class="inserted"><ins><em>hub</em></ins></span> is <span 
class="removed"><del><strong>connected</strong></del></span> <span 
class="inserted"><ins><em>useless without that.&lt;/p&gt;
+    hospitals</strong></del></span> <span 
class="inserted"><ins><em>hub</em></ins></span> is <span 
class="removed"><del><strong>connected to the internet. Naturally &lt;a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    its</strong></del></span> <span class="inserted"><ins><em>useless without 
that.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912170"&gt;
-    &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
-    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
-    managed</em></ins></span> to <span 
class="inserted"><ins><em>interfere</em></ins></span> the <span 
class="removed"><del><strong>internet. Naturally</strong></del></span> <span 
class="inserted"><ins><em>Amazon Ring proprietary system, and</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access</em></ins></span>
-    its <span class="removed"><del><strong>security has been 
cracked&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Note that this article misuses the term &lt;a
-href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-     referring to crackers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>camera, speakers and 
microphones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Some</em></ins></span> security <span 
class="removed"><del><strong>has been cracked&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Note that</strong></del></span> <span 
class="inserted"><ins><em>breakers (wrongly referred in</em></ins></span> this 
article <span class="removed"><del><strong>misuses the 
term</strong></del></span> <span class="inserted"><ins><em>as</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
+     referring</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
+    managed</em></ins></span> to <span 
class="removed"><del><strong>crackers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>interfere the Amazon Ring proprietary system, and 
&lt;a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
+    its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
@@ -192,9 +201,9 @@
     &lt;p&gt;Best Buy made controllable appliances and</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
 distributing a spyware app for its headphones&lt;/a&gt;.
-Specifically, the app would record the names of</strong></del></span>
+Specifically,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
-    shut down</em></ins></span> the <span class="removed"><del><strong>audio 
files
+    shut down</em></ins></span> the <span class="removed"><del><strong>app 
would record the names of the audio files
 users listen</strong></del></span> <span 
class="inserted"><ins><em>service</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
 &lt;/p&gt;
 
@@ -214,99 +223,98 @@
 
   &lt;li <span class="removed"><del><strong>id="anova"&gt;
   &lt;p&gt;Anova sabotaged users' cooking devices with a downgrade 
that</strong></del></span> <span class="inserted"><ins><em>id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were</em></ins></span> tethered <span 
class="removed"><del><strong>them</strong></del></span> to <span 
class="removed"><del><strong>a remote server.</strong></del></span> <span 
class="inserted"><ins><em>the manufacturer's server,
-    and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
-  cookers won't function.&lt;/a&gt;&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>Internet,
-its security is crap&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;For example, a cracker can gain access</strong></del></span> <span 
class="inserted"><ins><em>company made them all cease</em></ins></span> to 
<span class="inserted"><ins><em>work&lt;/a&gt; by shutting down that
+    &lt;p&gt;The Jibo robot toys were</em></ins></span> tethered <span 
class="removed"><del><strong>them</strong></del></span> to <span 
class="inserted"><ins><em>the manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
+    the company made them all cease to work&lt;/a&gt; by shutting down that
     server.&lt;/p&gt;
 
-    &lt;p&gt;The shutdown might ironically be good for their users, 
since</em></ins></span> the <span class="removed"><del><strong>dishwasher's 
filesystem,
- infect it with malware, and force the dishwasher</strong></del></span>
-    <span class="inserted"><ins><em>product was designed</em></ins></span> to 
<span class="removed"><del><strong>launch attacks</strong></del></span> <span 
class="inserted"><ins><em>manipulate people by presenting a phony
-    semblance of emotions, and was most certainly spying</em></ins></span> on
- <span class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+    &lt;p&gt;The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting</em></ins></span> 
a <span class="removed"><del><strong>remote server.</strong></del></span> <span 
class="inserted"><ins><em>phony
+    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
     two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the</em></ins></span> devices <span 
class="inserted"><ins><em>they connect to.&lt;/p&gt;
+    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered in an earlier Medtronics communication
-    protocol</em></ins></span> in <span class="inserted"><ins><em>2008. 
Apparently, nothing was done by</em></ins></span> the <span 
class="removed"><del><strong>network. Since these dishwashers are 
used</strong></del></span> <span class="inserted"><ins><em>company to
-    correct them. This means you can't rely on proprietary software
-    developers to fix bugs</em></ins></span> in <span 
class="removed"><del><strong>hospitals,
- such attacks could potentially put hundreds of lives at 
risk.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>their 
products.&lt;/p&gt;</em></ins></span>
+    vulnerabilities were discovered in</em></ins></span> an <span 
class="removed"><del><strong>account</strong></del></span> <span 
class="inserted"><ins><em>earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely</em></ins></span> on <span 
class="removed"><del><strong>Anova's servers,</strong></del></span> <span 
class="inserted"><ins><em>proprietary software
+    developers to fix bugs in</em></ins></span> their
+  <span class="removed"><del><strong>cookers won't 
function.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>products.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
-etc.,
-usually &lt;a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
-previous owners</strong></del></span>
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant 
dishwasher</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
-    manufacturer (now Amazon)</em></ins></span> can <span 
class="removed"><del><strong>still remotely control it&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-      report everything</strong></del></span> <span 
class="inserted"><ins><em>watch all the time. Now it turns out</em></ins></span>
-    that <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Ring (now Amazon) doorbell camera</em></ins></span> is
+<span class="removed"><del><strong>&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> <span class="inserted"><ins><em>designed so 
that</em></ins></span> the <span class="removed"><del><strong>Internet,
+its security is crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;For example, a cracker</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer (now 
Amazon)</em></ins></span> can <span class="removed"><del><strong>gain access 
to</strong></del></span> <span class="inserted"><ins><em>watch 
all</em></ins></span> the <span class="removed"><del><strong>dishwasher's 
filesystem,
+ infect</strong></del></span> <span class="inserted"><ins><em>time. 
Now</em></ins></span> it <span class="removed"><del><strong>with 
malware,</strong></del></span> <span class="inserted"><ins><em>turns out
+    that &lt;a
     
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
-    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+    anyone else can also watch,</em></ins></span> and <span 
class="removed"><del><strong>force the dishwasher</strong></del></span> <span 
class="inserted"><ins><em>fake videos too&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The third party vulnerability</em></ins></span> is <span 
class="removed"><del><strong>viewed on them,</strong></del></span> <span 
class="inserted"><ins><em>presumably
-    unintentional</em></ins></span> and <span class="inserted"><ins><em>Amazon 
will probably fix it. However, we
-    do</em></ins></span> not <span class="removed"><del><strong>just broadcasts
-      and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>expect Amazon to change</em></ins></span> the <span 
class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>design that &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
-    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and Amazon will probably fix it. However, we
+    do not expect Amazon</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on
+ other devices in</strong></del></span> <span 
class="inserted"><ins><em>change</em></ins></span> the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
+ such attacks could potentially put hundreds of lives at risk.&lt;/p&gt;
+
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
+etc.,
+usually</strong></del></span> <span class="inserted"><ins><em>design 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
+previous owners can still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span>
 
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the 
user</em></ins></span> is <span class="removed"><del><strong>coming 
from</strong></del></span> <span class="inserted"><ins><em>still
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+      report everything</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
+      and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>constantly
+    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>still
     paying for</em></ins></span> the <span class="removed"><del><strong>user's 
own
     computer,</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>TV reports what</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>is. The existence</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>a way to
-    disable</strong></del></span> <span class="inserted"><ins><em>ink 
cartridges that would otherwise be in
-    working order.&lt;/p&gt;
+    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>is. The existence of a way to
+    disable</strong></del></span> <span class="inserted"><ins><em>spies on 
users, and involves totally unacceptable
+    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it 
was</strong></del></span> <span class="inserted"><ins><em>use of ink cartridges 
that would otherwise be</em></ins></span> in
+    <span class="removed"><del><strong>these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</strong></del></span>
 
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if</strong></del></span> <span 
class="inserted"><ins><em>video they capture to Amazon servers&lt;/a&gt;, which 
save</em></ins></span> it <span class="removed"><del><strong>were not hidden as 
it was in
-    these TVs, does not legitimize</strong></del></span>
-    <span class="inserted"><ins><em>long-term.&lt;/p&gt;
-
-    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  <span class="inserted"><ins><em>&lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;The report was as of 2014, but we don't expect this has got
 better.&lt;/p&gt;
 
-&lt;p&gt;This</strong></del></span> <span 
class="inserted"><ins><em>video</em></ins></span> shows <span 
class="inserted"><ins><em>everyone</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
+&lt;p&gt;This</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video</em></ins></span> shows <span 
class="inserted"><ins><em>everyone</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
 consent before collecting personal data are totally inadequate.  And
 what happens if a user declines consent?  Probably</strong></del></span> <span 
class="inserted"><ins><em>comes near, or merely
     passes by,</em></ins></span> the <span class="removed"><del><strong>TV 
will say,
@@ -429,24 +437,24 @@
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The</strong></del></span>
+&lt;p&gt;The &lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+&ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it won't accept
+third-party printing materials.  It is</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through the company's server. They have
-    all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
-&ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it won't accept
-third-party printing materials.  It is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
-    all users at once), as well as</em></ins></span> the <span 
class="removed"><del><strong>Keurig</strong></del></span> <span 
class="inserted"><ins><em>risk</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it</strong></del></span> <span 
class="inserted"><ins><em>an outage (which</em></ins></span> is
-<span class="removed"><del><strong>being discontinued, which means that 
eventually authorized materials won't
-be available and</strong></del></span> <span class="inserted"><ins><em>what
-    just happened).&lt;/p&gt;
+    only through</em></ins></span> the <span 
class="removed"><del><strong>Keurig</strong></del></span> <span 
class="inserted"><ins><em>company's server. They have
+    all the nasty characteristics</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it is
+being discontinued, which means that eventually authorized materials won't
+be available</strong></del></span> <span class="inserted"><ins><em>such 
devices: &lt;a
+    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
+    surveillance,</em></ins></span> and <span class="removed"><del><strong>the 
printers may become unusable.&lt;/p&gt;
 
-    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
+&lt;p&gt;With</strong></del></span> <span class="inserted"><ins><em>danger of 
sabotage&lt;/a&gt; (of</em></ins></span> a <span 
class="inserted"><ins><em>specific user, or of
+    all users at once), as well as the risk of an outage (which is what
+    just happened).&lt;/p&gt;
 
-&lt;p&gt;With a</strong></del></span> <span class="inserted"><ins><em>desired 
temperature requires running
+    &lt;p&gt;In addition, setting the desired temperature requires running
     nonfree software. With an old-fashioned thermostat, you can do it
     using controls right on the thermostat.&lt;/p&gt;
   &lt;/li&gt;
@@ -526,16 +534,15 @@
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a
 
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
-DVDs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers to be suckers</em></ins></span> 
and <span class="removed"><del><strong>Bluray disks have DRM&lt;/a&gt;.
+DVDs and Bluray disks have DRM&lt;/a&gt;.
 &lt;/p&gt;
 
 &lt;p&gt;That page uses spin terms that favor DRM,
-including</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
-digital &ldquo;rights&rdquo; management&lt;/a&gt;
-and &lt;a 
href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,
+including &lt;a 
href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+digital &ldquo;rights&rdquo; management&lt;/a&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
+    &lt;p&gt;Amazon recently invited consumers to be suckers</em></ins></span> 
and &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,
 and it claims that &ldquo;artists&rdquo; (rather than companies) are
 primarily responsible for putting digital restrictions management into
 these disks.  Nonetheless, it is a reference for</strong></del></span>
@@ -587,151 +594,117 @@
     the <span class="removed"><del><strong>fault of app developers. That is 
clearly true if</strong></del></span> <span class="inserted"><ins><em>fact 
that</em></ins></span> the <span class="removed"><del><strong>apps are 
proprietary software.&lt;/p&gt;
 
 &lt;p&gt;Anything whose name is &ldquo;Smart&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>device</em></ins></span> is <span 
class="removed"><del><strong>most likely going</strong></del></span> <span 
class="inserted"><ins><em>tethered</em></ins></span> to
-<span class="removed"><del><strong>screw you.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;
-Malware found on &lt;a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
-security cameras available through Amazon&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;A camera</strong></del></span> <span class="inserted"><ins><em>a 
server.&lt;/p&gt;
+<span class="removed"><del><strong>screw you.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>a server.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
     proprietary tethering&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;But it also demonstrates</em></ins></span> that <span 
class="removed"><del><strong>records locally on physical media, and has no 
network
-connection, does not threaten people with surveillance&mdash;neither
-by watching people through</strong></del></span> the <span 
class="removed"><del><strong>camera, nor through malware 
in</strong></del></span> <span class="inserted"><ins><em>device 
gives</em></ins></span> the
-<span class="removed"><del><strong>camera.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>company
+    &lt;p&gt;But it also demonstrates that the device gives the company
     surveillance capability.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt; &lt;a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-FitBit fitness trackers have a Bluetooth vulnerability&lt;/a&gt; that allows
-attackers to send malware to the devices, which can subsequently
-spread</strong></del></span>
+&lt;p&gt;
+Malware found on</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;
     &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
-    designed for hospitals is connected</em></ins></span> to <span 
class="removed"><del><strong>computers and other FitBit trackers that interact 
with
-them.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do</strong></del></span> 
the <span class="removed"><del><strong>encryption with
-proprietary firmware so you can't trust it.  Western 
Digital's</strong></del></span> <span class="inserted"><ins><em>internet. 
Naturally</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-&ldquo;My Passport&rdquo; drives have a back door&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;
-Hospira infusion pumps, which are used to administer drugs to
-a patient, were rated &ldquo;&lt;a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
-least secure IP device I've ever seen&lt;/a&gt;&rdquo; by 
a</strong></del></span>
+    designed for hospitals is connected to the internet. 
Naturally</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
-    its</em></ins></span> security
-<span class="removed"><del><strong>researcher.&lt;/p&gt;
+    its</em></ins></span> security <span class="removed"><del><strong>cameras 
available through Amazon&lt;/a&gt;.
+&lt;/p&gt;
 
-&lt;p&gt;Depending on what drug is being infused, the insecurity could
-open</strong></del></span> <span class="inserted"><ins><em>has been 
cracked&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;A camera</strong></del></span> <span class="inserted"><ins><em>has 
been cracked&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>records locally</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring</em></ins></span> to <span 
class="removed"><del><strong>murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    referring to crackers.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Due to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
-    &lt;p&gt;The</em></ins></span> bad security in <span 
class="removed"><del><strong>a drug pump, crackers could use 
it</strong></del></span> <span class="inserted"><ins><em>many Internet of 
Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="inserted"><ins><em>snoop on the people that use 
them&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop</em></ins></span> on <span class="removed"><del><strong>physical 
media, and has no network
+connection, does not threaten people with surveillance&mdash;neither
+by watching</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> people <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>camera, nor through malware 
in</strong></del></span> <span class="inserted"><ins><em>stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the 
term</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
-kill patients&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that</em></ins></span> the
+<span class="removed"><del><strong>camera.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>article uses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
-&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out</strong></del></span>
+&lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201708230"&gt;
-    &lt;p&gt;Sonos &lt;a
-    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
+    &lt;p&gt;Sonos</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+FitBit fitness trackers have a Bluetooth vulnerability&lt;/a&gt; that allows
+attackers to send malware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
     told all its customers, &ldquo;Agree&rdquo;</em></ins></span>
-    to <span class="inserted"><ins><em>snooping or the product will stop 
working&lt;/a&gt;.  &lt;a
+    to <span class="inserted"><ins><em>snooping or</em></ins></span> the <span 
class="removed"><del><strong>devices, which can subsequently
+spread</strong></del></span> <span class="inserted"><ins><em>product will stop 
working&lt;/a&gt;.  &lt;a
     
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
     Another article&lt;/a&gt; says they won't forcibly change the software, but
-    people won't</em></ins></span> be <span 
class="removed"><del><strong>stupidly vulnerable</strong></del></span> <span 
class="inserted"><ins><em>able</em></ins></span> to
-<span class="removed"><del><strong>intrusion.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>get any upgrades and eventually it will
-    stop working.&lt;/p&gt;</em></ins></span>
+    people won't be able</em></ins></span> to <span 
class="removed"><del><strong>computers</strong></del></span> <span 
class="inserted"><ins><em>get any upgrades</em></ins></span> and <span 
class="inserted"><ins><em>eventually it will
+    stop working.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The &lt;a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-FTC punished</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>company for making webcams with bad 
security&lt;/a&gt; so
-that it was easy for anyone</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>watch them.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>snoop on 
other people, DJI</em></ins></span> is <span 
class="removed"><del><strong>possible to &lt;a
-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
-kill people by taking control of medical implants by radio&lt;/a&gt;.  More
-information</strong></del></span> in <span class="inserted"><ins><em>many 
cases</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC
 News&lt;/a&gt; and
-&lt;a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on</em></ins></span> other <span 
class="removed"><del><strong>FitBit trackers that interact with
+them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people, 
DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Lots</strong></del></span>
+&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do the 
encryption</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201706200"&gt;
-    &lt;p&gt;Many models</em></ins></span> of <span 
class="removed"><del><strong>&lt;a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-hospital equipment has lousy security&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected cameras
+    &lt;p&gt;Many models of Internet-connected cameras
     are tremendously insecure.  They have login
-    accounts with hard-coded passwords, which can't be changed, and &lt;a
-    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
-    is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+    accounts</em></ins></span> with
+<span class="removed"><del><strong>proprietary firmware so 
you</strong></del></span> <span class="inserted"><ins><em>hard-coded passwords, 
which</em></ins></span> can't <span class="removed"><del><strong>trust it.  
Western Digital's</strong></del></span> <span class="inserted"><ins><em>be 
changed, and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+&ldquo;My Passport&rdquo; drives have a back 
door&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
+    is no way to delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;
+Hospira infusion</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;
     &lt;p&gt;The proprietary code that runs pacemakers,
-    insulin pumps, and other medical devices is &lt;a
+    insulin</em></ins></span> pumps, <span class="removed"><del><strong>which 
are used to administer drugs to
+a patient,</strong></del></span> <span class="inserted"><ins><em>and other 
medical devices is &lt;a
     href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
     security faults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705180"&gt;
-    &lt;p&gt;Bird and rabbit pets were implemented for Second
-    Life by a company that tethered their food to a server.  &lt;a
+    &lt;p&gt;Bird and rabbit pets</em></ins></span> were <span 
class="removed"><del><strong>rated &ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
+least secure IP device I've ever seen&lt;/a&gt;&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>implemented for Second
+    Life</em></ins></span> by a <span class="removed"><del><strong>security
+researcher.&lt;/p&gt;
+
+&lt;p&gt;Depending on what drug is being infused,</strong></del></span> <span 
class="inserted"><ins><em>company that tethered their food to a server.  &lt;a
     
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
-    It shut down the server and the pets more or less died&lt;/a&gt;.&lt;/p&gt;
+    It shut down</em></ins></span> the <span 
class="removed"><del><strong>insecurity could
+open</strong></del></span> <span class="inserted"><ins><em>server 
and</em></ins></span> the <span class="removed"><del><strong>door to 
murder.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>pets 
more or less died&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704190"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Due to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
     &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
@@ -1015,11 +988,11 @@
     &lt;p&gt;Vizio goes a step further than other TV
     manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</em></ins></span> and
-    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track you
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn this off, but having</em></ins></span> it 
<span class="inserted"><ins><em>enabled by default
+    &lt;p&gt;It is possible to turn this off, but having it enabled by default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1028,7 +1001,7 @@
     to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo</em></ins></span> 
can <span class="removed"><del><strong>be 
fatal.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>now &lt;a
+    information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
     users to new combined surveillance by default.&lt;/p&gt;
@@ -1057,15 +1030,45 @@
   &lt;/li&gt;
 
   &lt;li id="M201506080"&gt;
-    &lt;p&gt;Due to bad security in a drug pump, crackers could use it to &lt;a
+    &lt;p&gt;Due to</em></ins></span> bad security in a drug pump, crackers 
could use it to &lt;a
     
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
     kill patients&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
+intrusion.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+FTC punished a company for making webcams with bad security&lt;/a&gt; so
+that it was easy for anyone to watch them.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;It is possible to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+kill</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs</em></ins></span> people <span 
class="removed"><del><strong>by taking control of medical implants by 
radio&lt;/a&gt;.  More
+information in &lt;a
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
+&lt;a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Lots of &lt;a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;, and it can be 
fatal.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>watch, 
and even what they wanted to
     record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1441,7 +1444,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:09 $
+$Date: 2020/06/25 23:01:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-appliances.de.po    24 Jun 2020 05:37:09 -0000      1.91
+++ malware-appliances.de.po    25 Jun 2020 23:01:26 -0000      1.92
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -146,6 +146,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: malware-appliances.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-appliances.es.po    24 Jun 2020 09:20:54 -0000      1.26
+++ malware-appliances.es.po    25 Jun 2020 23:01:26 -0000      1.27
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-06-24 10:58+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -95,6 +96,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- malware-appliances.fr.po    24 Jun 2020 05:02:40 -0000      1.153
+++ malware-appliances.fr.po    25 Jun 2020 23:01:26 -0000      1.154
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-06-22 11:38+0200\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -91,6 +92,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-appliances.pot      24 Jun 2020 05:37:09 -0000      1.76
+++ malware-appliances.pot      25 Jun 2020 23:01:26 -0000      1.77
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -79,6 +79,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a "
+"href=\"https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/\";>snoop
 "
+"every second of what the user is watching</a>. This is illegal due to the "
+"Video Privacy Protection Act of 1988, but they're circumventing it through "
+"EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a "
 
"href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\";>
 "
 "A disasterous security bug</a> touches millions of products in the Internet "

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- malware-appliances.ru.po    24 Jun 2020 05:04:03 -0000      1.191
+++ malware-appliances.ru.po    25 Jun 2020 23:01:26 -0000      1.192
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -93,6 +94,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- nl.po       24 Jun 2020 05:37:10 -0000      1.187
+++ nl.po       25 Jun 2020 23:01:26 -0000      1.188
@@ -2085,6 +2085,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- pl.po       24 Jun 2020 05:37:10 -0000      1.186
+++ pl.po       25 Jun 2020 23:01:26 -0000      1.187
@@ -1657,6 +1657,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- pot 24 Jun 2020 05:37:10 -0000      1.185
+++ pot 25 Jun 2020 23:01:26 -0000      1.186
@@ -1459,6 +1459,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary-surveillance.de-diff.html       24 Jun 2020 05:37:12 -0000      
1.113
+++ proprietary-surveillance.de-diff.html       25 Jun 2020 23:01:26 -0000      
1.114
@@ -2269,6 +2269,14 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901070"&gt;
     &lt;p&gt;Vizio TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
@@ -3726,7 +3734,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/06/25 23:01:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- proprietary-surveillance.de.po      24 Jun 2020 05:37:12 -0000      1.328
+++ proprietary-surveillance.de.po      25 Jun 2020 23:01:26 -0000      1.329
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -3723,6 +3723,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-surveillance.es.po      24 Jun 2020 05:37:12 -0000      1.42
+++ proprietary-surveillance.es.po      25 Jun 2020 23:01:26 -0000      1.43
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-06-02 22:31-0400\n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2\n"
 
@@ -3199,6 +3200,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.506
retrieving revision 1.507
diff -u -b -r1.506 -r1.507
--- proprietary-surveillance.fr.po      24 Jun 2020 05:37:12 -0000      1.506
+++ proprietary-surveillance.fr.po      25 Jun 2020 23:01:26 -0000      1.507
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-06-01 13:13+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3195,6 +3196,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary-surveillance.it-diff.html       24 Jun 2020 05:37:12 -0000      
1.179
+++ proprietary-surveillance.it-diff.html       25 Jun 2020 23:01:26 -0000      
1.180
@@ -2363,6 +2363,14 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901070"&gt;
     &lt;p&gt;Vizio TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
@@ -3514,7 +3522,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/06/25 23:01:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- proprietary-surveillance.it.po      24 Jun 2020 05:37:12 -0000      1.340
+++ proprietary-surveillance.it.po      25 Jun 2020 23:01:26 -0000      1.341
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -3489,6 +3489,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary-surveillance.ja-diff.html       24 Jun 2020 05:37:12 -0000      
1.196
+++ proprietary-surveillance.ja-diff.html       25 Jun 2020 23:01:26 -0000      
1.197
@@ -2330,6 +2330,14 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901070"&gt;
     &lt;p&gt;Vizio TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
@@ -3363,7 +3371,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/06/25 23:01:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary-surveillance.ja.po      24 Jun 2020 05:37:13 -0000      1.322
+++ proprietary-surveillance.ja.po      25 Jun 2020 23:01:26 -0000      1.323
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -2720,6 +2720,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary-surveillance.pot        24 Jun 2020 05:37:13 -0000      1.261
+++ proprietary-surveillance.pot        25 Jun 2020 23:01:26 -0000      1.262
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2170,6 +2170,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a "
+"href=\"https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/\";>snoop
 "
+"every second of what the user is watching</a>. This is illegal due to the "
+"Video Privacy Protection Act of 1988, but they're circumventing it through "
+"EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Vizio TVs <a "
 
"href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\";>
 "
 "collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.602
retrieving revision 1.603
diff -u -b -r1.602 -r1.603
--- proprietary-surveillance.ru.po      24 Jun 2020 05:37:13 -0000      1.602
+++ proprietary-surveillance.ru.po      25 Jun 2020 23:01:26 -0000      1.603
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3169,6 +3170,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary.de-diff.html    22 Jun 2020 09:02:54 -0000      1.155
+++ proprietary.de-diff.html    25 Jun 2020 23:01:26 -0000      1.156
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,17 +57,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -153,11 +153,11 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -212,6 +212,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202006160"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
@@ -254,22 +262,6 @@
     software&mdash;free software is controlled by its users who wouldn't
     let do such things to them.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening to a song.  They send device identifying
-    information too.&lt;/p&gt;
-
-    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, and &lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
-
-    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
-    but we condemn this no matter who does it.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -332,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/22 09:02:54 $
+$Date: 2020/06/25 23:01:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary.de.po   22 Jun 2020 09:02:54 -0000      1.196
+++ proprietary.de.po   25 Jun 2020 23:01:26 -0000      1.197
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -506,29 +514,6 @@
 "them."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary.es.po   24 Jun 2020 09:20:54 -0000      1.276
+++ proprietary.es.po   25 Jun 2020 23:01:26 -0000      1.277
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -312,6 +313,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -392,42 +401,6 @@
 "privativo. En el software libre son los usuarios quienes tienen el control, "
 "y no permitirían que les hicieran tales cosas."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-"Los teléfonos Xiaomi <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">registran muchas "
-"de las acciones del usuario</a>: ejecutar una aplicación, abrir una carpeta, 
"
-"visitar un sitio web, escuchar una canción... También envían información "
-"identificativa del dispositivo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-"Otros programas que no son libres también espían. Por ejemplo, Spotify y "
-"otros antiservicios de transmisión en continuo elaboran un dosier de cada "
-"usuario y <a href=\"/malware/proprietary-surveillance."
-"html#M201508210\">exigen que los usuarios se identifiquen para pagar</a>. "
-"¡Vade retro, Spotify!"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"Forbes exculpa de los mismos agravios cuando los culpables no son chinos, "
-"pero nosotros los condenamos sin importar quién los cometa."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,6 +478,40 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song.  They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "Los teléfonos Xiaomi <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"
+#~ "\">registran muchas de las acciones del usuario</a>: ejecutar una "
+#~ "aplicación, abrir una carpeta, visitar un sitio web, escuchar una "
+#~ "canción... También envían información identificativa del dispositivo."
+
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>.  Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "Otros programas que no son libres también espían. Por ejemplo, Spotify y 
"
+#~ "otros antiservicios de transmisión en continuo elaboran un dosier de cada 
"
+#~ "usuario y <a href=\"/malware/proprietary-surveillance."
+#~ "html#M201508210\">exigen que los usuarios se identifiquen para pagar</a>. "
+#~ "¡Vade retro, Spotify!"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "Forbes exculpa de los mismos agravios cuando los culpables no son chinos, "
+#~ "pero nosotros los condenamos sin importar quién los cometa."
+
+#~ msgid ""
 #~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 #~ "Google Play Terms of Service</a> insist that the user of Android accept "
 #~ "the presence of universal back doors in apps released by Google."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.323
retrieving revision 1.324
diff -u -b -r1.323 -r1.324
--- proprietary.fr.po   22 Jun 2020 09:39:40 -0000      1.323
+++ proprietary.fr.po   25 Jun 2020 23:01:26 -0000      1.324
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-06-22 11:38+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -308,6 +309,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -389,41 +398,6 @@
 "logiciel libre est sous le contrôle de ses utilisateurs, et ils ne se "
 "laisseraient pas traiter de la sorte."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-"Les téléphones Xiaomi <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">rapportent une "
-"grande partie de ce que font les utilisateurs</a> : lancer une appli, "
-"regarder un répertoire, aller sur un site web, écouter une chanson. Ils "
-"envoient également les identifiants de l'appareil."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-"D'autres programmes non libres sont aussi des espions. Spotify et autres mal-"
-"services constituent un dossier sur chaque utilisateur et <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\">le forcent à s'identifier pour "
-"payer</a>. Dehors, dehors, satané Spotify !"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"Forbes excuse ces mêmes fautes quand les coupables ne sont pas chinois, mais 
"
-"nous les condamnons quel que soit leur auteur."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -498,6 +472,39 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song.  They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "Les téléphones Xiaomi <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"
+#~ "\">rapportent une grande partie de ce que font les utilisateurs</a> : "
+#~ "lancer une appli, regarder un répertoire, aller sur un site web, écouter 
"
+#~ "une chanson. Ils envoient également les identifiants de l'appareil."
+
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>.  Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "D'autres programmes non libres sont aussi des espions. Spotify et autres "
+#~ "mal-services constituent un dossier sur chaque utilisateur et <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\">le forcent à "
+#~ "s'identifier pour payer</a>. Dehors, dehors, satané Spotify !"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "Forbes excuse ces mêmes fautes quand les coupables ne sont pas chinois, "
+#~ "mais nous les condamnons quel que soit leur auteur."
+
+#~ msgid ""
 #~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 #~ "Google Play Terms of Service</a> insist that the user of Android accept "
 #~ "the presence of universal back doors in apps released by Google."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.it-diff.html    22 Jun 2020 09:02:55 -0000      1.167
+++ proprietary.it-diff.html    25 Jun 2020 23:01:26 -0000      1.168
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,8 +57,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -69,9 +70,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,6 +211,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202006160"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
@@ -253,22 +261,6 @@
     software&mdash;free software is controlled by its users who wouldn't
     let do such things to them.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening to a song.  They send device identifying
-    information too.&lt;/p&gt;
-
-    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, and &lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
-
-    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
-    but we condemn this no matter who does it.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -331,7 +323,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/22 09:02:55 $
+$Date: 2020/06/25 23:01:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary.it.po   22 Jun 2020 09:02:55 -0000      1.205
+++ proprietary.it.po   25 Jun 2020 23:01:26 -0000      1.206
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -510,29 +518,6 @@
 "them."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- proprietary.ja-diff.html    22 Jun 2020 09:02:55 -0000      1.171
+++ proprietary.ja-diff.html    25 Jun 2020 23:01:26 -0000      1.172
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,12 +58,12 @@
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited {
-   color: #004caa;
+ #skiplinks a, #skiplinks a:visited</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
+   <span class="inserted"><ins><em>color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -122,27 +122,27 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html"&gt;Malware
 in the Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
 &lt;div class="malfunctions"&gt;
 &lt;ul&gt;
-&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -157,15 +157,15 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -186,10 +186,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -209,6 +209,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202006160"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
@@ -251,22 +259,6 @@
     software&mdash;free software is controlled by its users who wouldn't
     let do such things to them.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening to a song.  They send device identifying
-    information too.&lt;/p&gt;
-
-    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, and &lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
-
-    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
-    but we condemn this no matter who does it.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -329,7 +321,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/22 09:02:55 $
+$Date: 2020/06/25 23:01:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.189
retrieving revision 1.190
diff -u -b -r1.189 -r1.190
--- proprietary.ja.po   22 Jun 2020 09:02:55 -0000      1.189
+++ proprietary.ja.po   25 Jun 2020 23:01:26 -0000      1.190
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -371,29 +379,6 @@
 "them."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary.nl-diff.html    22 Jun 2020 09:02:55 -0000      1.168
+++ proprietary.nl-diff.html    25 Jun 2020 23:01:27 -0000      1.169
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -65,13 +65,13 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,6 +211,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202006160"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
@@ -253,22 +261,6 @@
     software&mdash;free software is controlled by its users who wouldn't
     let do such things to them.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening to a song.  They send device identifying
-    information too.&lt;/p&gt;
-
-    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, and &lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
-
-    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
-    but we condemn this no matter who does it.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -331,7 +323,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/22 09:02:55 $
+$Date: 2020/06/25 23:01:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary.nl.po   22 Jun 2020 09:02:55 -0000      1.179
+++ proprietary.nl.po   25 Jun 2020 23:01:27 -0000      1.180
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -363,6 +363,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -414,29 +422,6 @@
 "them."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary.pl-diff.html    22 Jun 2020 09:02:55 -0000      1.185
+++ proprietary.pl-diff.html    25 Jun 2020 23:01:27 -0000      1.186
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -62,8 +62,8 @@
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -114,8 +114,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As of January, 2020, the pages in this directory list around 450
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 500 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>January, 2020, the pages in this directory 
list around 450
+instances of malicious functionalities (with more than 500 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -155,17 +155,17 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -209,6 +209,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202006160"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
@@ -251,22 +259,6 @@
     software&mdash;free software is controlled by its users who wouldn't
     let do such things to them.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening to a song.  They send device identifying
-    information too.&lt;/p&gt;
-
-    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, and &lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
-
-    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
-    but we condemn this no matter who does it.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -329,7 +321,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/22 09:02:55 $
+$Date: 2020/06/25 23:01:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary.pl.po   22 Jun 2020 09:02:56 -0000      1.172
+++ proprietary.pl.po   25 Jun 2020 23:01:27 -0000      1.173
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -540,6 +540,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -591,29 +599,6 @@
 "them."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary.pot     22 Jun 2020 09:02:56 -0000      1.169
+++ proprietary.pot     25 Jun 2020 23:01:27 -0000      1.170
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -257,6 +257,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a "
+"href=\"https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/\";>snoop
 "
+"every second of what the user is watching</a>. This is illegal due to the "
+"Video Privacy Protection Act of 1988, but they're circumventing it through "
+"EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a "
 
"href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\";>
 "
 "A disasterous security bug</a> touches millions of products in the Internet "
@@ -308,29 +317,6 @@
 "such things to them."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a "
-"href=\"https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\";>report
 "
-"many actions the user takes</a>: starting an app, looking at a folder, "
-"visiting a website, listening to a song.  They send device identifying "
-"information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a "
-"href=\"/malware/proprietary-surveillance.html#M201508210\"> they make users "
-"identify themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary.pt-br.po        23 Jun 2020 03:00:37 -0000      1.300
+++ proprietary.pt-br.po        25 Jun 2020 23:01:27 -0000      1.301
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-06-22 23:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -305,6 +306,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -382,42 +391,6 @@
 "Esse tipo de falha é possível apenas com software proprietário — o 
software "
 "livre é controlado por seus usuários que não deixariam essas coisas com 
eles."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-"Telefones Xiaomi <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">relata muitas "
-"ações que o usuário executa</a>: iniciando um aplicativo, olhando uma 
pasta, "
-"visitando um site, ouvindo uma música. Eles também enviam informações de "
-"identificação do dispositivo."
-
-# "out, out, damned.." refere-se à peça de Shakespeare "Macbeth", Ato 5, 
Cena 1
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-"Outros programas não livres também bisbilhotam. Por exemplo, o Spotify e "
-"outros serviços de streaming fazem um dossiê sobre cada usuário e <a 
href=\"/"
-"malware/proprietary-surveillance.html#M201508210\"> eles fazem os usuários "
-"se identificarem para pagar</a>. Sai, sai, Spotify amaldiçoado!"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"A Forbes exonera os mesmos erros quando os culpados não são chineses, mas "
-"condenamos isso, não importa quem o faça."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -493,6 +466,40 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song.  They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "Telefones Xiaomi <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">relata "
+#~ "muitas ações que o usuário executa</a>: iniciando um aplicativo, 
olhando "
+#~ "uma pasta, visitando um site, ouvindo uma música. Eles também enviam "
+#~ "informações de identificação do dispositivo."
+
+# "out, out, damned.." refere-se à peça de Shakespeare "Macbeth", Ato 5, 
Cena 1
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>.  Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "Outros programas não livres também bisbilhotam. Por exemplo, o Spotify e 
"
+#~ "outros serviços de streaming fazem um dossiê sobre cada usuário e <a 
href="
+#~ "\"/malware/proprietary-surveillance.html#M201508210\"> eles fazem os "
+#~ "usuários se identificarem para pagar</a>. Sai, sai, Spotify amaldiçoado!"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "A Forbes exonera os mesmos erros quando os culpados não são chineses, 
mas "
+#~ "condenamos isso, não importa quem o faça."
+
+#~ msgid ""
 #~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 #~ "Google Play Terms of Service</a> insist that the user of Android accept "
 #~ "the presence of universal back doors in apps released by Google."

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.357
retrieving revision 1.358
diff -u -b -r1.357 -r1.358
--- proprietary.ru.po   22 Jun 2020 09:32:12 -0000      1.357
+++ proprietary.ru.po   25 Jun 2020 23:01:27 -0000      1.358
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -312,6 +313,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -390,42 +399,6 @@
 "программах&nbsp;&mdash; свободные программы 
контролируются пользователями, а "
 "они не позволят вытворять с собой такое."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-"Телефоны Xiaomi <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">докладывают
 о "
-"многих действиях пользователя</a>: запуске 
приложения, просмотре каталогов, "
-"посещении сайтов, прослушивании песен. 
Они высылают и сведения, "
-"идентифицирующие устройство."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-"Другие несвободные программы тоже 
шпионят. Например, Spotify и другие "
-"медвежьи услуги трансляции заводят досье 
на каждого пользователя и <a href="
-"\"/malware/proprietary-surveillance.html#M201508210\"> заставляют "
-"пользователей идентифицировать себя при 
оплате</a>. Прочь, прочь, проклятый "
-"Spotify!"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"Forbes оправдывает эти же проступки, когда 
ответственность лежит не на "
-"китайцах, но мы осуждаем это независимо от 
того, кто это делает."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -502,6 +475,40 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song.  They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "Телефоны Xiaomi <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"
+#~ "\">докладывают о многих действиях 
пользователя</a>: запуске приложения, "
+#~ "просмотре каталогов, посещении сайтов, 
прослушивании песен. Они высылают "
+#~ "и сведения, идентифицирующие 
устройство."
+
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>.  Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "Другие несвободные программы тоже 
шпионят. Например, Spotify и другие "
+#~ "медвежьи услуги трансляции заводят 
досье на каждого пользователя и <a "
+#~ "href=\"/malware/proprietary-surveillance.html#M201508210\"> 
заставляют "
+#~ "пользователей идентифицировать себя 
при оплате</a>. Прочь, прочь, "
+#~ "проклятый Spotify!"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "Forbes оправдывает эти же проступки, когда 
ответственность лежит не на "
+#~ "китайцах, но мы осуждаем это независимо 
от того, кто это делает."
+
+#~ msgid ""
 #~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 #~ "Google Play Terms of Service</a> insist that the user of Android accept "
 #~ "the presence of universal back doors in apps released by Google."

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary.tr.po   22 Jun 2020 09:02:56 -0000      1.25
+++ proprietary.tr.po   25 Jun 2020 23:01:27 -0000      1.26
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-06-13 14:40+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -306,6 +306,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -381,42 +389,6 @@
 "yazılım, böyle bir şeyi kendilerine yapmak istemeyecek kendi 
kullanıcıları "
 "tarafından denetlenir."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-"Xiaomi telefonlar <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">kullanıcının "
-"gerçekleştirdiği bir çok eylemi raporluyor</a>: bir uygulama başlatma, 
bir "
-"dizine bakma, bir websitesini ziyaret etme, bir şarkı dinleme. Aygıt "
-"tanımlama bilgisini de gönderiyorlar."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-"Diğer özgür olmayan programlar da gizlice gözetliyor. Örneğin Spotify 
ve "
-"diğer akış hizmet-sizlik-leri her kullanıcı hakkında bir sicil tutuyor 
ve <a "
-"href=\"/malware/proprietary-surveillance.html#M201508210\">kullanıcıları "
-"ödeme yapmak için kendilerini tanıtmak zorunda bırakıyor</a>. Yok ol, 
lanet "
-"Spotify!"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"Forbes, sorumluların Çinli olmadığı durumlarda aynı hataları aklıyor, 
ancak "
-"biz kimin yaptığından bağımsız hepsini kınıyoruz."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -497,6 +469,40 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song.  They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "Xiaomi telefonlar <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"
+#~ "\">kullanıcının gerçekleştirdiği bir çok eylemi raporluyor</a>: bir 
"
+#~ "uygulama başlatma, bir dizine bakma, bir websitesini ziyaret etme, bir "
+#~ "şarkı dinleme. Aygıt tanımlama bilgisini de gönderiyorlar."
+
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>.  Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "Diğer özgür olmayan programlar da gizlice gözetliyor. Örneğin 
Spotify ve "
+#~ "diğer akış hizmet-sizlik-leri her kullanıcı hakkında bir sicil 
tutuyor ve "
+#~ "<a href=\"/malware/proprietary-surveillance."
+#~ "html#M201508210\">kullanıcıları ödeme yapmak için kendilerini 
tanıtmak "
+#~ "zorunda bırakıyor</a>. Yok ol, lanet Spotify!"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "Forbes, sorumluların Çinli olmadığı durumlarda aynı hataları 
aklıyor, "
+#~ "ancak biz kimin yaptığından bağımsız hepsini kınıyoruz."
+
+#~ msgid ""
 #~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 #~ "Google Play Terms of Service</a> insist that the user of Android accept "
 #~ "the presence of universal back doors in apps released by Google."

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary.zh-cn.po        23 Jun 2020 04:00:25 -0000      1.20
+++ proprietary.zh-cn.po        25 Jun 2020 23:01:27 -0000      1.21
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-06-23 11:43+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -288,6 +289,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -360,37 +369,6 @@
 
"这种差劲的功能只有在专有软件上才有可能&mdash;&mdash;自由软件由å
…¶ç”¨æˆ·æŽ§åˆ¶ï¼Œç”¨"
 "户不会允许这样的功能。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-"小米手机 <a 
href=\"https://www.forbes.com/sites/thomasbrewster/2020/04/30/";
-"exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-"
-"peoples-private-web-and-phone-use/\">大量上报用户的操作</a>:启动应用、查看文"
-"件夹、访问网页、聆听音乐。它们还上报设备识别信息。"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-"其他非自由设备也会监听。例如,Spotify 
等流媒体服务商为每个用户制作档案,并且 "
-"<a 
href=\"/malware/proprietary-surveillance.html#M201508210\">用户付款时要表"
-"明身份</a>。太过分了,该死的 Spotify!"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"作恶者不单单是中国人,福布斯就在做同样的事;无
论是谁作恶,我们都要谴责。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,6 +451,35 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/";
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song.  They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "小米手机 <a 
href=\"https://www.forbes.com/sites/thomasbrewster/2020/04/30/";
+#~ "exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-"
+#~ 
"peoples-private-web-and-phone-use/\">大量上报用户的操作</a>:启动应用、查"
+#~ 
"看文件夹、访问网页、聆听音乐。它们还上报设备识别信息。"
+
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>.  Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "其他非自由设备也会监听。例如,Spotify 
等流媒体服务商为每个用户制作档案,并"
+#~ "且 <a 
href=\"/malware/proprietary-surveillance.html#M201508210\">用户付款"
+#~ "时要表明身份</a>。太过分了,该死的 Spotify!"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "作恶者不单单是中国人,福布斯就在做同样的事;无
论是谁作恶,我们都要谴责。"
+
+#~ msgid ""
 #~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 #~ "Google Play Terms of Service</a> insist that the user of Android accept "
 #~ "the presence of universal back doors in apps released by Google."

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.zh-tw-diff.html 22 Jun 2020 09:02:56 -0000      1.148
+++ proprietary.zh-tw-diff.html 25 Jun 2020 23:01:27 -0000      1.149
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,17 +57,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -153,11 +153,11 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -212,6 +212,14 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202006160"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
@@ -254,22 +262,6 @@
     software&mdash;free software is controlled by its users who wouldn't
     let do such things to them.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening to a song.  They send device identifying
-    information too.&lt;/p&gt;
-
-    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, and &lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
-
-    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
-    but we condemn this no matter who does it.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -332,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/22 09:02:56 $
+$Date: 2020/06/25 23:01:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary.zh-tw.po        22 Jun 2020 09:02:56 -0000      1.159
+++ proprietary.zh-tw.po        25 Jun 2020 23:01:27 -0000      1.160
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -433,6 +433,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
@@ -484,29 +492,6 @@
 "them."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/";
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song.  They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>.  Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- pt-br.po    24 Jun 2020 05:37:13 -0000      1.248
+++ pt-br.po    25 Jun 2020 23:01:27 -0000      1.249
@@ -1803,6 +1803,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.412
retrieving revision 1.413
diff -u -b -r1.412 -r1.413
--- ru.po       24 Jun 2020 05:37:13 -0000      1.412
+++ ru.po       25 Jun 2020 23:01:27 -0000      1.413
@@ -2122,6 +2122,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- tr.po       24 Jun 2020 05:37:13 -0000      1.19
+++ tr.po       25 Jun 2020 23:01:27 -0000      1.20
@@ -1563,6 +1563,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- zh-cn.po    24 Jun 2020 05:37:13 -0000      1.16
+++ zh-cn.po    25 Jun 2020 23:01:27 -0000      1.17
@@ -1567,6 +1567,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- zh-tw.po    24 Jun 2020 05:37:13 -0000      1.186
+++ zh-tw.po    25 Jun 2020 23:01:27 -0000      1.187
@@ -1653,6 +1653,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-";
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
 "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
 "source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]