www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Thu, 9 Jul 2020 04:02:19 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/07/09 04:02:18

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-cars.de-diff.html malware-cars.de.po 
                         malware-cars.es.po malware-cars.fr.po 
                         malware-cars.pot malware-cars.ru.po nl.po pl.po 
                         pot proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.es.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.336&r2=1.337
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.es.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.330&r2=1.331
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.510&r2=1.511
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.342&r2=1.343
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.324&r2=1.325
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.606&r2=1.607
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.208&r2=1.209
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.363&r2=1.364
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.422&r2=1.423
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.191&r2=1.192

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- de.po       1 Jul 2020 14:02:13 -0000       1.191
+++ de.po       9 Jul 2020 08:02:16 -0000       1.192
@@ -4567,6 +4567,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -12060,6 +12067,23 @@
 msgid "Latest additions"
 msgstr "Letzte Ergänzungen"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- es.po       3 Jul 2020 10:00:43 -0000       1.276
+++ es.po       9 Jul 2020 08:02:16 -0000       1.277
@@ -4101,6 +4101,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -11824,6 +11831,23 @@
 msgid "Latest additions"
 msgstr "Añadidos recientes"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.336
retrieving revision 1.337
diff -u -b -r1.336 -r1.337
--- fr.po       1 Jul 2020 16:13:45 -0000       1.336
+++ fr.po       9 Jul 2020 08:02:16 -0000       1.337
@@ -3720,6 +3720,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -10493,6 +10500,23 @@
 msgid "Latest additions"
 msgstr "Ajouts récents"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- it.po       1 Jul 2020 14:02:13 -0000       1.191
+++ it.po       9 Jul 2020 08:02:16 -0000       1.192
@@ -4318,6 +4318,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -11329,6 +11336,23 @@
 msgid "Latest additions"
 msgstr "Ultime aggiunte"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- ja.po       1 Jul 2020 14:02:13 -0000       1.199
+++ ja.po       9 Jul 2020 08:02:16 -0000       1.200
@@ -3257,6 +3257,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -8806,6 +8813,23 @@
 msgid "Latest additions"
 msgstr "最新の追加"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- malware-cars.de-diff.html   24 Jun 2020 05:37:09 -0000      1.36
+++ malware-cars.de-diff.html   9 Jul 2020 08:02:16 -0000       1.37
@@ -51,73 +51,110 @@
 &lt;div id="last-div" class="reduced-width"&gt;</em></ins></span>
 &lt;h2&gt;Malware In Cars&lt;/h2&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/proprietary/proprietary.html"&gt;Other examples</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/proprietary/proprietary.html"&gt;Other examples of proprietary 
malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;p&gt;Here are examples of</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;div class="infobox"&gt;
 &lt;hr class="full-width" /&gt;
-&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+&lt;p&gt;Nonfree (proprietary) software is very often</em></ins></span> 
malware <span class="inserted"><ins><em>(designed to
 mistreat the user). Nonfree software is controlled by its developers,
-which puts them in a position of power over the users; &lt;a
+which puts them</em></ins></span> in <span 
class="removed"><del><strong>cars.&lt;/p&gt;
+
+&lt;ul&gt;  
+&lt;li&gt;
+&lt;p&gt;Tesla used</strong></del></span> a <span 
class="removed"><del><strong>universal backdoor in its software to limit 
customers to
+using just &lt;a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
+part</strong></del></span> <span 
class="inserted"><ins><em>position</em></ins></span> of <span 
class="inserted"><ins><em>power over</em></ins></span> the <span 
class="removed"><del><strong>battery of some cars&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;While remotely allowing car 
&ldquo;owners&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>users; &lt;a
 href="/philosophy/free-software-even-more-important.html"&gt;that is the
 basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
-that power to the detriment of the users they ought to serve.&lt;/p&gt;
+that power</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> the <span 
class="removed"><del><strong>whole battery
+capacity did not do them any harm,</strong></del></span> <span 
class="inserted"><ins><em>detriment of</em></ins></span> the <span 
class="removed"><del><strong>same back door would permit
+Tesla (perhaps under</strong></del></span> <span 
class="inserted"><ins><em>users they ought to serve.&lt;/p&gt;
 
-&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;p&gt;This typically takes</em></ins></span> the <span 
class="removed"><del><strong>command</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of <span 
class="removed"><del><strong>some government)</strong></del></span> <span 
class="inserted"><ins><em>malicious functionalities.&lt;/p&gt;
 &lt;hr class="full-width" /&gt;
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
 &lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought to be in this page but isn't
-here, please write
-to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;
+&lt;p&gt;If you know of an example that ought</em></ins></span> to <span 
class="removed"><del><strong>remotely order
+the car</strong></del></span> <span class="inserted"><ins><em>be in this page 
but isn't
+here, please write</em></ins></span>
+to <span class="removed"><del><strong>use none of its battery. Or 
perhaps</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;</em></ins></span>
+to <span class="removed"><del><strong>drive its 
passenger</strong></del></span> <span class="inserted"><ins><em>inform us. 
Please include the URL of a trustworthy reference or two</em></ins></span>
+to <span class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="malware-cars"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201912171"&gt;
-    &lt;p&gt;Most modern cars now &lt;a
-    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds</em></ins></span> of <span 
class="inserted"><ins><em>data to the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible, as it involves
-    cracking the car's computer, which is always hidden and running with
-    proprietary software.&lt;/p&gt;
+  &lt;li id="M202007010"&gt;
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; 
through</em></ins></span> a <span class="removed"><del><strong>torture 
prison.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>universal
+    back door.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201912171"&gt;
+    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969"&gt;
+Audi's proprietary software used a simple method</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data</em></ins></span> to <span 
class="removed"><del><strong>cheat on emissions
+tests&lt;/a&gt;:</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. For
+    the user, access</em></ins></span> to <span 
class="removed"><del><strong>activate a special low-emission gearshifting mode 
until</strong></del></span> the
+<span class="removed"><del><strong>first time</strong></del></span> <span 
class="inserted"><ins><em>data is nearly impossible, as it involves
+    cracking</em></ins></span> the <span class="removed"><del><strong>car made 
a turn.
+&lt;/li&gt;
+  
+&lt;li&gt;
+&lt;p&gt;Caterpillar vehicles come</strong></del></span> <span 
class="inserted"><ins><em>car's computer, which is always hidden and 
running</em></ins></span> with <span 
class="removed"><del><strong>a</strong></del></span>
+    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909160"&gt;
-    &lt;p&gt;Tesla users claim Tesla &lt;a
-    
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW"&gt;force-installed
-    software to cut down on battery range&lt;/a&gt;, rather than replace the
-    defective batteries. Tesla did this to avoid having to run their
+    &lt;p&gt;Tesla users claim Tesla</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;
+back-door</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW"&gt;force-installed
+    software</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>cut down on battery range&lt;/a&gt;, rather than 
replace</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt; 
remotely.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>defective batteries. Tesla did this to 
avoid having to run their
     warranty.&lt;/p&gt;
 
-    &lt;p&gt;This means that</em></ins></span> proprietary <span 
class="removed"><del><strong>malware&lt;/a&gt;&lt;/p&gt;
-
-&lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>software 
can potentially be a way to
-    commit perjury with impunity.&lt;/p&gt;
+    &lt;p&gt;This means that proprietary software can potentially be a way to
+    commit perjury with impunity.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904150"&gt;
-    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
-    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+Volkswagen</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904150"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen</em></ins></span> programmed its car 
engine computers to <span class="inserted"><ins><em>&lt;a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;</em></ins></span>
     detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
-    run dirty the rest of the time. In real driving, the cars exceeded
+    run dirty the rest of the <span 
class="removed"><del><strong>time.&lt;/p&gt;
+
+&lt;p&gt;In</strong></del></span> <span class="inserted"><ins><em>time. 
In</em></ins></span> real driving, the cars exceeded
     emissions standards by a factor of up to 35.&lt;/p&gt;
 
     &lt;p&gt;Using free software would not have stopped Volkswagen from
-    programming it this way, but would have made it harder to conceal,
+    programming it this way, but would have made <span 
class="removed"><del><strong>it harder</strong></del></span> <span 
class="inserted"><ins><em>it harder to conceal,
     and given the users the possibility of correcting the deception.&lt;/p&gt;
 
-    &lt;p&gt;Former executives of Volkswagen</em></ins></span> are <span 
class="removed"><del><strong>examples</strong></del></span> <span 
class="inserted"><ins><em>being &lt;a
+    &lt;p&gt;Former executives of Volkswagen are being &lt;a
     
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
     sued over this fraud&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots</em></ins></span> of <span 
class="removed"><del><strong>malware</strong></del></span> <span 
class="inserted"><ins><em>personal data, and &lt;a
+    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
     when they go to a junkyard the driver's personal data goes with
     them&lt;/a&gt;.&lt;/p&gt;
@@ -131,11 +168,7 @@
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you 
succeeded</em></ins></span> in <span 
class="removed"><del><strong>cars.&lt;/p&gt;
-
-&lt;ul&gt;  
-&lt;li&gt;
-&lt;p&gt;Tesla used</strong></del></span> <span 
class="inserted"><ins><em>breaking the
+    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
@@ -143,7 +176,7 @@
   &lt;li id="M201812300"&gt;
     &lt;p&gt;New GM cars &lt;a
     href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of</em></ins></span> a universal <span 
class="removed"><del><strong>backdoor</strong></del></span> <span 
class="inserted"><ins><em>back door&lt;/a&gt;.&lt;/p&gt;
+    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Every nonfree program offers the user zero security against its
     developer. With this malfeature, GM has explicitly made things even
@@ -164,26 +197,25 @@
   &lt;li id="M201810230"&gt;
     &lt;p&gt;GM &lt;a
     href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked the choices of radio programs&lt;/a&gt;</em></ins></span> in its 
<span class="removed"><del><strong>software</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;connected&rdquo; cars, minute by 
minute.&lt;/p&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
     &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
     sneaking it into the contract that users sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>limit 
customers</strong></del></span> <span class="inserted"><ins><em>you,
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following your movements, tracking passengers' cell
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
-    &lt;p&gt;But if you really want</em></ins></span> to
-<span class="removed"><del><strong>using just</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure the car's
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
     hardware cannot collect any of that data, or that the software
     is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    &lt;p&gt;AI-powered driving apps can &lt;a
+    
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -194,11 +226,11 @@
   &lt;/li&gt;
 
   &lt;li id="M201709090.1"&gt;
-    &lt;p&gt;Tesla used software to limit the</em></ins></span> part of the 
battery <span class="removed"><del><strong>of</strong></del></span>
-    <span class="inserted"><ins><em>that was available to customers 
in</em></ins></span> some <span 
class="removed"><del><strong>cars&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>cars, and &lt;a
+    &lt;p&gt;Tesla used software to limit the part of the battery
+    that was available to customers in some cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
     a universal back door in the software&lt;/a&gt; to temporarily increase
-    this limit.&lt;/p&gt;</em></ins></span>
+    this limit.&lt;/p&gt;
 
     &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
     whole battery capacity did not do them any harm, the same back
@@ -207,11 +239,9 @@
     perhaps to drive its passenger to a torture prison.&lt;/p&gt;
   &lt;/li&gt;
   
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702170"&gt;
-    &lt;p&gt;The mobile apps for communicating</em></ins></span> &lt;a
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
+  &lt;li id="M201702170"&gt;
+    &lt;p&gt;The mobile apps for communicating &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
     a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is in addition to the fact that the car contains a cellular
@@ -221,31 +251,11 @@
   &lt;/li&gt;
 
   &lt;li id="M201611060"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+    &lt;p&gt;&lt;a
     
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969"&gt;
     Audi's proprietary software used a simple method to cheat on emissions
     tests&lt;/a&gt;: to activate a special low-emission gearshifting mode until
-    the first time <span class="removed"><del><strong>the car made a turn.
-&lt;/li&gt;
-  
-&lt;li&gt;
-&lt;p&gt;Caterpillar vehicles come with a &lt;a
-href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;
-back-door to shutoff the engine&lt;/a&gt; remotely.&lt;/p&gt;
-&lt;/li&gt;
-  
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
-Volkswagen programmed its car engine computers to detect the
-Environmental Protection Agency's emission tests&lt;/a&gt;,
-and run dirty the rest of the time.&lt;/p&gt;
-
-&lt;p&gt;In real driving, the cars exceeded emissions standards by a factor
-of up to 35.&lt;/p&gt;
-
-&lt;p&gt;Using free software would not have stopped Volkswagen from
-programming it this way, but would have</strong></del></span> <span 
class="inserted"><ins><em>the car</em></ins></span> made <span 
class="removed"><del><strong>it harder</strong></del></span> <span 
class="inserted"><ins><em>a turn.&lt;/p&gt;
+    the first time the car made a turn.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201608110"&gt;
@@ -451,7 +461,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:09 $
+$Date: 2020/07/09 08:02:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-cars.de.po  24 Jun 2020 05:37:09 -0000      1.26
+++ malware-cars.de.po  9 Jul 2020 08:02:16 -0000       1.27
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -146,6 +146,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "

Index: malware-cars.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.es.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-cars.es.po  24 Jun 2020 05:37:09 -0000      1.8
+++ malware-cars.es.po  9 Jul 2020 08:02:16 -0000       1.9
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-02-17 12:01+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -95,6 +96,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "

Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- malware-cars.fr.po  24 Jun 2020 05:02:40 -0000      1.41
+++ malware-cars.fr.po  9 Jul 2020 08:02:16 -0000       1.42
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-02-15 17:39+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -90,6 +91,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "

Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-cars.pot    24 Jun 2020 05:37:09 -0000      1.20
+++ malware-cars.pot    9 Jul 2020 08:02:16 -0000       1.21
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -79,6 +79,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a "
+"href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/\";> "
+"enable and disable functionality in cars</a> through a universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a "
 "href=\"https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html\";> "
 "record and send various kinds of data to the manufacturer</a>. For the user, "

Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- malware-cars.ru.po  24 Jun 2020 05:04:03 -0000      1.48
+++ malware-cars.ru.po  9 Jul 2020 08:02:16 -0000       1.49
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -93,6 +94,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- nl.po       1 Jul 2020 14:02:13 -0000       1.192
+++ nl.po       9 Jul 2020 08:02:16 -0000       1.193
@@ -3136,6 +3136,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -8173,6 +8180,23 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- pl.po       1 Jul 2020 14:02:13 -0000       1.191
+++ pl.po       9 Jul 2020 08:02:16 -0000       1.192
@@ -2709,6 +2709,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -7671,6 +7678,23 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- pot 1 Jul 2020 14:02:13 -0000       1.190
+++ pot 9 Jul 2020 08:02:16 -0000       1.191
@@ -2493,6 +2493,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -6999,6 +7006,23 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #
 #
 #

Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary-back-doors.de-diff.html 24 Jun 2020 05:37:10 -0000      1.41
+++ proprietary-back-doors.de-diff.html 9 Jul 2020 08:02:16 -0000       1.42
@@ -463,32 +463,21 @@
     tricks.&lt;/p&gt;
 
     &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
-    malicious so far, the point is that nobody should have such power,
+    malicious so far, the point is <span class="removed"><del><strong>that 
nobody should have such power,
+      which could also be used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>that nobody should 
have such power,
     which could also be used maliciously.  You might well decide to
     let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for <span 
class="removed"><del><strong>allowing it
-      to &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the 
right to
-      decide who (if anyone) to trust in this way.&lt;/p&gt;
+    it considers malicious.  But there is no excuse for allowing it to
+    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
+    who (if anyone) to trust in this way.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
-      Windows 8 also has a back door for remotely deleting 
apps&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;You might well decide to let a security service that you trust
-      remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
-      But there is no excuse for 
&lt;em&gt;deleting&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>allowing it to
-    &lt;em&gt;delete&lt;/em&gt;</em></ins></span> the programs, and you should 
have the right to decide <span 
class="removed"><del><strong>whom</strong></del></span>
-    <span class="inserted"><ins><em>who</em></ins></span> (if anyone) to trust 
in this way.&lt;/p&gt;
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
+  &lt;li id="M200808110"&gt;
     &lt;p&gt;The iPhone has a back door &lt;a
     
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
     that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
     &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
-    this power because of <span class="removed"><del><strong>course we can 
trust Apple.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>course we can trust Apple.&lt;/p&gt;
+    this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -496,6 +485,13 @@
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202007010"&gt;
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; through a universal
+    back door.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202004130"&gt;
     &lt;p&gt;The &lt;a 
href="https://www.google.com/mobile/android/market-tos.html"&gt;
     Google Play Terms of Service&lt;/a&gt; insist that the user of Android 
accept
@@ -516,21 +512,24 @@
 
     &lt;p&gt;The adware is in a modified version of an
     essential system configuration app. The back door is a
-    surreptitious addition to a program whose stated purpose is to be a &lt;a
+    surreptitious addition</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> a
+      <span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
+      considers malicious.  But there</strong></del></span> <span 
class="inserted"><ins><em>program whose stated purpose</em></ins></span> is 
<span class="removed"><del><strong>no excuse</strong></del></span> <span 
class="inserted"><ins><em>to be a &lt;a
     
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
-    universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
+    universal back door</em></ins></span> for <span 
class="removed"><del><strong>allowing it</strong></del></span> <span 
class="inserted"><ins><em>firmware&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;In other words, a program whose raison d'être is malicious has
-    a secret secondary malicious purpose. All this is in addition to the
-    malware of Android itself.&lt;/p&gt;
+    a secret secondary malicious purpose. All this is in 
addition</em></ins></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
the <span class="removed"><del><strong>programs, and you should 
have</strong></del></span>
+    <span class="inserted"><ins><em>malware of Android itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910130.1"&gt;
     &lt;p&gt;The Chinese Communist Party's &lt;a
     href="/proprietary/proprietary-surveillance.html#M201910130"&gt;
-    &ldquo;Study the Great Nation&rdquo; app&lt;/a&gt; was found to contain 
&lt;a
+    &ldquo;Study</em></ins></span> the <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>Great Nation&rdquo; app&lt;/a&gt; was 
found</em></ins></span> to
+      <span class="removed"><del><strong>decide who (if 
anyone)</strong></del></span> <span class="inserted"><ins><em>contain &lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    a back-door allowing developers to run any code they wish&lt;/a&gt; in the
+    a back-door allowing developers</em></ins></span> to <span 
class="removed"><del><strong>trust</strong></del></span> <span 
class="inserted"><ins><em>run any code they wish&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>this way.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the
     users' phone, as &ldquo;superusers.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
@@ -540,29 +539,44 @@
     saying that the tests were only performed on the Android version
     of the app, and that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
+    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201908220"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+      Windows 8 also</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908220"&gt;
     &lt;p&gt;ChromeBooks are programmed for obsolescence:
-    ChromeOS has a universal back door that is used for updates and &lt;a
+    ChromeOS</em></ins></span> has a <span 
class="inserted"><ins><em>universal</em></ins></span> back door <span 
class="inserted"><ins><em>that is used</em></ins></span> for <span 
class="removed"><del><strong>remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;You might well decide</strong></del></span> <span 
class="inserted"><ins><em>updates and &lt;a
     
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
-    ceases to operate at a predefined date&lt;/a&gt;. From then on, there
-    appears to be no support whatsoever for the computer.&lt;/p&gt;
+    ceases</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>operate at</em></ins></span> a <span 
class="removed"><del><strong>security service that you trust
+      remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
+      But</strong></del></span> <span class="inserted"><ins><em>predefined 
date&lt;/a&gt;. From then on,</em></ins></span> there <span 
class="removed"><del><strong>is</strong></del></span>
+    <span class="inserted"><ins><em>appears to be</em></ins></span> no <span 
class="removed"><del><strong>excuse</strong></del></span> <span 
class="inserted"><ins><em>support whatsoever</em></ins></span> for <span 
class="removed"><del><strong>&lt;em&gt;deleting&lt;/em&gt;</strong></del></span>
 the <span class="removed"><del><strong>programs, and</strong></del></span> 
<span class="inserted"><ins><em>computer.&lt;/p&gt;
 
-    &lt;p&gt;In other words, when you stop getting screwed by the back door,
-    you start getting screwed by the obsolescence.&lt;/p&gt;
+    &lt;p&gt;In other words, when</em></ins></span> you
+      <span class="removed"><del><strong>should have</strong></del></span> 
<span class="inserted"><ins><em>stop getting screwed by</em></ins></span> the 
<span class="removed"><del><strong>right to decide whom (if anyone) to trust in 
this
+      way.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>back door,
+    you start getting screwed by the obsolescence.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>iPhone</strong></del></span> <span 
class="inserted"><ins><em>FordPass Connect feature of some Ford 
vehicles</em></ins></span> has <span class="removed"><del><strong>a back 
door</strong></del></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+      that allows Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
+      &ldquo;inappropriate&rdquo;.  Jobs said it's OK for 
Apple</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>have this
+      power because</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
+    &lt;p&gt;If you own one</em></ins></span> of <span 
class="removed"><del><strong>course we can trust 
Apple.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>these 
cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -930,7 +944,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/07/09 08:02:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary-back-doors.de.po        24 Jun 2020 05:37:10 -0000      1.139
+++ proprietary-back-doors.de.po        9 Jul 2020 08:02:16 -0000       1.140
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -843,6 +843,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 "Google Play Terms of Service</a> insist that the user of Android accept the "
 "presence of universal back doors in apps released by Google."

Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary-back-doors.es.po        24 Jun 2020 05:37:10 -0000      1.36
+++ proprietary-back-doors.es.po        9 Jul 2020 08:02:16 -0000       1.37
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-04-14 11:18+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -696,6 +697,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 "Google Play Terms of Service</a> insist that the user of Android accept the "
 "presence of universal back doors in apps released by Google."

Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary-back-doors.fr.po        24 Jun 2020 05:02:40 -0000      1.155
+++ proprietary-back-doors.fr.po        9 Jul 2020 08:02:16 -0000       1.156
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-06-20 10:31+0200\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-04-14 10:17+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -701,6 +702,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 "Google Play Terms of Service</a> insist that the user of Android accept the "
 "presence of universal back doors in apps released by Google."

Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary-back-doors.it-diff.html 24 Jun 2020 05:37:10 -0000      1.67
+++ proprietary-back-doors.it-diff.html 9 Jul 2020 08:02:16 -0000       1.68
@@ -570,6 +570,13 @@
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202007010"&gt;
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; through a universal
+    back door.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202004130"&gt;
     &lt;p&gt;The &lt;a 
href="https://www.google.com/mobile/android/market-tos.html"&gt;
     Google Play Terms of Service&lt;/a&gt; insist that the user of Android 
accept
@@ -971,7 +978,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/07/09 08:02:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary-back-doors.it.po        24 Jun 2020 05:37:11 -0000      1.131
+++ proprietary-back-doors.it.po        9 Jul 2020 08:02:16 -0000       1.132
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -858,6 +858,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 "Google Play Terms of Service</a> insist that the user of Android accept the "
 "presence of universal back doors in apps released by Google."

Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary-back-doors.ja-diff.html 24 Jun 2020 05:37:11 -0000      1.67
+++ proprietary-back-doors.ja-diff.html 9 Jul 2020 08:02:16 -0000       1.68
@@ -437,26 +437,32 @@
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202004130"&gt;
-    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.google.com/mobile/android/market-tos.html"&gt;
+  &lt;li id="M202007010"&gt;
+    &lt;p&gt;BMW will remotely</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality</em></ins></span> in <span 
class="removed"><del><strong>the 
backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cars&lt;/a&gt; through a universal
+    back door.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Caterpillar vehicles 
come with</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202004130"&gt;
+    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.google.com/mobile/android/market-tos.html"&gt;
     Google Play Terms of Service&lt;/a&gt; insist that the user of Android 
accept
     the presence of universal back doors in apps released by Google.&lt;/p&gt;
 
     &lt;p&gt;This does not tell us whether any of Google's apps currently
     contains a universal back door, but that is a secondary question.
-    In moral terms, demanding that people accept</em></ins></span> in <span 
class="inserted"><ins><em>advance certain bad
-    treatment is equivalent to actually doing it.  Whatever condemnation
-    the latter deserves,</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>former deserves the 
same.&lt;/p&gt;</em></ins></span>
+    In moral terms, demanding that people accept in advance certain bad
+    treatment is equivalent</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>actually doing it.  Whatever 
condemnation</em></ins></span>
+    the <span class="removed"><del><strong>engine&lt;/a&gt;
+     remotely.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>latter deserves, the former deserves the 
same.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Caterpillar 
vehicles</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+Mac OS X had an</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M202001090"&gt;
-    &lt;p&gt;Android phones subsidized by the US government</em></ins></span> 
come with &lt;a <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff the engine&lt;/a&gt;
-     remotely.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;li&gt;&lt;p&gt;
-Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+    &lt;p&gt;Android phones subsidized by the US government come 
with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
     preinstalled adware and a</em></ins></span> back door for <span 
class="removed"><del><strong>4 years&lt;/a&gt;.
@@ -959,7 +965,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/07/09 08:02:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-back-doors.ja.po        24 Jun 2020 05:37:11 -0000      1.115
+++ proprietary-back-doors.ja.po        9 Jul 2020 08:02:16 -0000       1.116
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -665,6 +665,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 "Google Play Terms of Service</a> insist that the user of Android accept the "
 "presence of universal back doors in apps released by Google."

Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary-back-doors.pot  24 Jun 2020 05:37:11 -0000      1.80
+++ proprietary-back-doors.pot  9 Jul 2020 08:02:16 -0000       1.81
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -491,6 +491,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a "
+"href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/\";> "
+"enable and disable functionality in cars</a> through a universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 "Google Play Terms of Service</a> insist that the user of Android accept the "
 "presence of universal back doors in apps released by Google."

Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary-back-doors.ru.po        24 Jun 2020 05:04:03 -0000      1.204
+++ proprietary-back-doors.ru.po        9 Jul 2020 08:02:16 -0000       1.205
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:31+0200\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -688,6 +689,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The <a href=\"https://www.google.com/mobile/android/market-tos.html\";> "
 "Google Play Terms of Service</a> insist that the user of Android accept the "
 "presence of universal back doors in apps released by Google."

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-surveillance.de-diff.html       26 Jun 2020 23:31:13 -0000      
1.115
+++ proprietary-surveillance.de-diff.html       9 Jul 2020 08:02:16 -0000       
1.116
@@ -981,185 +981,97 @@
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
-    &lt;p&gt;An</em></ins></span> Android <span 
class="removed"><del><strong>apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect</strong></del></span> <span class="inserted"><ins><em>phone was 
observed</em></ins></span> to <span 
class="removed"><del><strong>100</strong></del></span> <span 
class="inserted"><ins><em>track location even while
+    &lt;p&gt;An</em></ins></span> Android <span 
class="removed"><del><strong>apps (but not</strong></del></span> <span 
class="inserted"><ins><em>phone was observed to track location even while
     in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span>
+    airplane mode.  Instead,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
+      connect</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
+  &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even</em></ins></span> when <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;location services&rdquo;</em></ins></span> are 
<span class="removed"><del><strong>sold.
-      Some Motorola</strong></del></span> <span 
class="inserted"><ins><em>turned off, even when
+    even when &ldquo;location services&rdquo; are turned off, even when
     the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable</em></ins></span> phones <span 
class="removed"><del><strong>modify Android to</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of</em></ins></span> data to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Some portable phones &lt;a
+    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots of data</em></ins></span> to <span 
class="removed"><del><strong>100</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android)</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+  &lt;li id="M201609140"&gt;
+    &lt;p&gt;Google Play (a component of Android)</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>completely stop</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>tracking.  This is
-    yet another example of nonfree software pretending</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> <span 
class="inserted"><ins><em>obey</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make it &lt;a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because 
this</strong></del></span> <span class="inserted"><ins><em>user,
-    when it's actually doing something else.  Such a thing</em></ins></span> 
would <span class="removed"><del><strong>require circumventing the iOS 
DRM.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span class="inserted"><ins><em>location 
tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi and Bluetooth the
-      obvious way</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a
- <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
+    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
     that users can't delete&lt;/a&gt;, and they send so much data that their
-    transmission is a substantial expense</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you 
want</strong></del></span> <span class="inserted"><ins><em>users.  Said 
transmission,
+    transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
     of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>any 
file on the system.&lt;/p&gt;</em></ins></span>
+    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
+  &lt;li id="M201308010"&gt;
     &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone in 
Android phones
-    and laptops&lt;/a&gt; (presumably Windows laptops).  
Here</em></ins></span> is <span class="removed"><del><strong>snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone in Android phones
+    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307280"&gt;
     &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version</em></ins></span> of <span 
class="inserted"><ins><em>Android that &lt;a
+    by Google, use a modified version of Android that &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends</em></ins></span> personal data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola</em></ins></span> phone <span 
class="removed"><del><strong>number that the user types into it&lt;/a&gt;; the 
server records these numbers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone &lt;a
     
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens</em></ins></span> for <span class="removed"><del><strong>at least 
30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>voice all the 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="inserted"><ins><em>users that install</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo;</em></ins></span> of 
<span class="removed"><del><strong>their</strong></del></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>is not enough</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span 
class="removed"><del><strong>photos</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms</em></ins></span> and
-      <span class="removed"><del><strong>videos</strong></del></span> <span 
class="inserted"><ins><em>Conditions&rdquo; that spell out 
what</em></ins></span>
-    they <span class="removed"><del><strong>make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you make</strong></del></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should clearly 
and
-    honestly identify</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>still counts as a
-      surveillance functionality.&lt;/p&gt;
+  &lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>collects on users, instead</em></ins></span> of 
<span class="removed"><del><strong>this</strong></del></span>
-    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
-
-    &lt;p&gt;However,</em></ins></span> to <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    &lt;p&gt;Some manufacturers add a &lt;a
+    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
     hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1172,135 +1084,65 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books</em></ins></span> can <span 
class="removed"><del><strong>access any of them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span> <span class="inserted"><ins><em>contain JavaScript 
code,</em></ins></span> and <span class="removed"><del><strong>get other info 
too.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
-      is still true in iOS 7.)&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
+  &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used</em></ins></span> by <span 
class="removed"><del><strong>default, though that can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>most US libraries,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of</em></ins></span> data <span 
class="removed"><del><strong>from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-    needed to check DRM!&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop on all the data</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+    the e-reader used by most US libraries, &lt;a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201212030"&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
-&lt;div <span class="inserted"><ins><em>class="big-section"&gt;
+&lt;div class="big-section"&gt;
   &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;div</em></ins></span> class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is 
pervasive</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
-    &lt;p&gt;Some Avast</em></ins></span> and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Android tracks location</strong></del></span> <span 
class="inserted"><ins><em>AVG extensions</em></ins></span>
-    for <span class="removed"><del><strong>Google</strong></del></span> <span 
class="inserted"><ins><em>Firefox and Chrome were found to</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
-      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to turn the 
phones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop</em></ins></span> on <span class="removed"><del><strong>and off, 
listen to the microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and 
web</strong></del></span> <span class="inserted"><ins><em>users' 
detailed</em></ins></span> browsing <span 
class="removed"><del><strong>history,</strong></del></span> <span 
class="inserted"><ins><em>habits&lt;/a&gt;. Mozilla</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>Google
-    removed</em></ins></span> the <span class="removed"><del><strong>contact 
list. This malware is designed</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
-    once more how unsafe nonfree software can be. Tools that are 
supposed</em></ins></span>
-    to
-      <span class="removed"><del><strong>disguise</strong></del></span> <span 
class="inserted"><ins><em>protect a proprietary system are, instead, infecting 
it with
-    additional malware (the system</em></ins></span> itself <span 
class="removed"><del><strong>from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>being the original 
malware).&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Some Avast and AVG extensions
+    for Firefox and Chrome were found to &lt;a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
+    removed the problematic extensions from their stores, but this shows
+    once more how unsafe nonfree software can be. Tools that are supposed
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
     reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>users can't delete&lt;/a&gt;,
-      and they send so much data</strong></del></span> <span 
class="inserted"><ins><em>this is used for repression of forbidden sharing
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates</em></ins></span> that <span 
class="removed"><del><strong>their transmission</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
-    is <span class="inserted"><ins><em>not</em></ins></span> a
-      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span 
class="inserted"><ins><em>cure</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
-      requested by</strong></del></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens</strong></del></span> <span class="inserted"><ins><em>nonfree 
software. It may avoid
-    paying</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1310,37 +1152,26 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202003010"&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether</em></ins></span> the <span 
class="removed"><del><strong>GPS and microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>user has 
Covid-19</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    estimates whether the user has Covid-19 and &lt;a
+    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M202001290"&gt;
+    &lt;p&gt;The Amazon Ring app does &lt;a
+    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
+  &lt;li id="M201912220"&gt;
     &lt;p&gt;The ToToc messaging app seems to be a &lt;a
     
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
     spying tool for the government of the United Arab Emirates&lt;/a&gt;.
-    Any</em></ins></span> nonfree <span class="removed"><del><strong>Snapchat 
app's principal purpose</strong></del></span> <span 
class="inserted"><ins><em>program could be doing this, and 
that</em></ins></span> is <span class="inserted"><ins><em>a good
-    reason</em></ins></span> to <span class="removed"><del><strong>restrict
-      the</strong></del></span> use <span class="inserted"><ins><em>free 
software instead.&lt;/p&gt;
+    Any nonfree program could be doing this, and that is a good
+    reason to use free software instead.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
-    the sense</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912090"&gt;
@@ -1348,276 +1179,146 @@
     when used for work, give employers powerful &lt;a
     
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
     snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software</em></ins></span> on the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span> <span class="inserted"><ins><em>device.  
Many employers demand</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>do this.  For</em></ins></span> the <span 
class="removed"><del><strong>user's list of</strong></del></span>
-    <span class="inserted"><ins><em>employee, this is simply nonfree software, 
as fundamentally unjust
-    and as dangerous as any</em></ins></span> other <span 
class="removed"><del><strong>people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree software.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>moviepass</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>and dis-service spy on users even more 
than</strong></del></span> <span 
class="inserted"><ins><em>requires</em></ins></span> users
-      <span class="removed"><del><strong>expected. It</strong></del></span> 
<span class="inserted"><ins><em>to grant it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, 
contacts,</em></ins></span> and <span class="removed"><del><strong>after 
going</strong></del></span>
-    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version was found</em></ins></span> to <span 
class="inserted"><ins><em>contain</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
-  &lt;/li&gt;
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
-    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Sarahah</strong></del></span>
-    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
-    app <span class="inserted"><ins><em>is mandatory at some 
workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email 
addresses&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
     Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting</em></ins></span> in <span 
class="removed"><del><strong>user's address
-      book to developer's server.  Note</strong></del></span> <span 
class="inserted"><ins><em>a text editor) includes a clarification
-    saying</em></ins></span> that <span class="removed"><del><strong>this 
article misuses the words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span> <span class="inserted"><ins><em>tests were only 
performed</em></ins></span> on <span class="removed"><del><strong>what people 
are listening</strong></del></span> <span class="inserted"><ins><em>the Android 
version
-    of the app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In addition, it 
may</strong></del></span> <span class="inserted"><ins><em>Apple, &ldquo;this 
kind of
-    &lsquo;superuser&rsquo; surveillance could not</em></ins></span> be <span 
class="removed"><del><strong>analyzing people's conversations to serve them 
with targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when</em></ins></span> it <span 
class="removed"><del><strong>demands to personal data in</strong></del></span> 
<span class="inserted"><ins><em>is turned off&lt;/a&gt;, after tricking them
-    into giving</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search</strong></del></span> app <span 
class="removed"><del><strong>that it will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order to use 
one</em></ins></span> of its <span class="removed"><del><strong>phones. The app 
will give Verizon the same
-   information about the</strong></del></span>
-    <span class="inserted"><ins><em>functionalities.&lt;/p&gt;
+  &lt;li id="M201909091"&gt;
+    &lt;p&gt;The Facebook app &lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when it is turned off&lt;/a&gt;, after tricking them
+    into giving the app broad permissions in order to use one of its
+    functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909090"&gt;
     &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
     
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of</em></ins></span> users' <span 
class="removed"><del><strong>searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the app</strong></del></span> <span 
class="inserted"><ins><em>lives to Facebook&lt;/a&gt;.&lt;/p&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There</em></ins></span> is <span 
class="inserted"><ins><em>a
-    proprietary program for adjusting a certain telescopic rifle 
sight.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the
-    user must explicitly opt-in before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>list of all</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not be a list</em></ins></span> 
of <span class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>who has installed
-    it.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features</em></ins></span>
-    of <span class="removed"><del><strong>data in</strong></del></span> the 
<span class="removed"><del><strong>phone, and</strong></del></span> <span 
class="inserted"><ins><em>operating system,</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it</strong></del></span> <span 
class="inserted"><ins><em>order to gather as much private data as
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
     they possibly can.&lt;/p&gt;
 
-    &lt;p&gt;Thus, we can't trust rules against spying.  What 
we</em></ins></span> can
-  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'</strong></del></span>
 <span class="inserted"><ins><em>trust is
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
     having control over the software we run.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users'</em></ins></span> movements <span 
class="removed"><del><strong>before and after</strong></del></span> <span 
class="inserted"><ins><em>even when</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user says &lt;a
+    users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to 
locations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>example illustrates how 
&ldquo;getting the user's consent&rdquo;
-        for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>involves an apparently unintentional weakness in 
Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+  &lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+    programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+  &lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
     requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
     the event.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware that can</em></ins></span> snoop on <span 
class="removed"><del><strong>what radio</strong></del></span> <span 
class="inserted"><ins><em>a lot of
-    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>contact list,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app</strong></del></span> 
<span class="inserted"><ins><em>has</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    &lt;p&gt;This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often &lt;a
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>picture you 
take according to who</strong></del></span>
-    <span class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>&ldquo;anonymized 
and aggregated,&rdquo; it can easily be
-    traced back</em></ins></span> to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>woman 
who uses</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
-    and <span class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>freedom 
to make their own pregnancy choices. Don't use
-    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
-    free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>same 
thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>you is 
available from</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>new one</em></ins></span> is <span 
class="removed"><del><strong>a typical example of</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
+    spying on you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>movements</em></ins></span> of <span 
class="inserted"><ins><em>Android phones and iPhones
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>proprietary 
software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
-    apps the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>a way that at least is visible and
-    optional&lt;/a&gt;. Not as bad as what</strong></del></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>phone has to be responsible</em></ins></span> for 
<span class="removed"><del><strong>children don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>sending
-    the location data to Google.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree</em></ins></span> apps <span 
class="removed"><del><strong>snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>that have 
access</em></ins></span> to <span class="inserted"><ins><em>sensitive data 
without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>snooping done 
by</strong></del></span> <span class="inserted"><ins><em>data, or pass it on to 
user-installed apps that have access to</em></ins></span>
-    the <span class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>network but no direct 
access to</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>data. This results</em></ins></span> in <span 
class="inserted"><ins><em>massive
-    surveillance on which</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
-      users to say &ldquo;I agree&rdquo;. That is</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which 
can</em></ins></span> use <span class="removed"><del><strong>by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> it 
<span class="removed"><del><strong>asked the</strong></del></span>
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the data, or pass it on to user-installed apps that have access to
+    the network but no direct access to the data. This results in massive
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever</em></ins></span> user <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult</em></ins></span> to
-      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>understand. In any case,
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
     &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1625,63 +1326,47 @@
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent</em></ins></span> personal data to <span 
class="removed"><del><strong>the app developer but did</strong></del></span> 
<span class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built 
apps that
-    way and released them, apparently</em></ins></span> not
-      <span class="removed"><del><strong>ask about sending 
it</strong></del></span> <span class="inserted"><ins><em>realizing that all the 
personal
-    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> shows <span class="inserted"><ins><em>that 
no one can trust a nonfree program, not even</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed,</em></ins></span> of <span 
class="inserted"><ins><em>which 24,000 (31%) transmit</em></ins></span> the 
<span class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>other companies, and &lt;a
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
     that the policies of a development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+  &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span 
class="removed"><del><strong>make</strong></del></span>
-    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>conversation</strong></del></span> 
<span class="inserted"><ins><em>user interface of most of them was designed to 
make uninstallation
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
@@ -1980,49 +1665,106 @@
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
       five tracking libraries. Developers of this app have confirmed that
       the non-premium version of the app does JavaScript injection for
-      tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;
+      tracking</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user and displaying ads.&lt;/dd&gt;
+    &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
+      Some Motorola phones modify Android to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's new voice messaging app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
 
-  &lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app &lt;a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's new Magic Photo app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic Photo app &lt;a
-    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share the picture you take according to who is
-    in the frame.&lt;/p&gt;
+    and suggests you</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>share</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>picture you take according</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>who is</em></ins></span>
+    in <span class="removed"><del><strong>iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> the <span 
class="removed"><del><strong>EU Copyright Directive make it &lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
+      would</strong></del></span> require <span 
class="removed"><del><strong>circumventing</strong></del></span> <span 
class="inserted"><ins><em>online access to some
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means the pictures are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely to be
+    sent across</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>wire to Facebook's 
servers</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
+    even if</em></ins></span> the
+      <span class="removed"><del><strong>obvious way &lt;a
+ 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn</strong></del></span> <span 
class="inserted"><ins><em>user didn't &ldquo;upload&rdquo;</em></ins></span> 
them <span class="removed"><del><strong>off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way</strong></del></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> the <span 
class="removed"><del><strong>phone is snooping</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
+    snoop</em></ins></span> on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>what people are listening to or watching&lt;/a&gt;. 
In addition,
     it may be analyzing people's conversations to serve them with targeted
     advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not only can &lt;a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A pregnancy test controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> data <span 
class="removed"><del><strong>to Apple's servers&lt;/a&gt;.  Big 
Brother</strong></del></span> <span class="inserted"><ins><em>in the phone, and 
in server accounts,
+    it</em></ins></span> can
+        <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>alter</em></ins></span> them <span 
class="removed"><del><strong>from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps that include &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps</em></ins></span> that <span 
class="inserted"><ins><em>include &lt;a
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
@@ -2031,39 +1773,73 @@
 
   &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was &lt;a
+    unrelated to</em></ins></span> the <span class="removed"><del><strong>user 
types into it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    found in</em></ins></span> the <span class="removed"><del><strong>server 
records</strong></del></span> <span class="inserted"><ins><em>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article should not have described</em></ins></span> these 
<span class="removed"><del><strong>numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
-    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>apps as
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
+    to <span class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>say &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that the usual analytics tools are
-    legitimate, but is that valid? Software developers have no right to
-    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other snooping.&lt;/p&gt;
+    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
+    legitimate, but is that valid? Software developers have no 
right</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
-    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
+    &lt;p&gt;More than 73% and</em></ins></span> 47% of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for Android 
and</em></ins></span> iOS <span 
class="removed"><del><strong>apps</strong></del></span>
+    <span class="inserted"><ins><em>respectively &lt;a 
href="https://techscience.org/a/2015103001/"&gt;share
     personal, behavioral and location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201508210"&gt;
     &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
-    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
-    to realize that it is nasty.&lt;/p&gt;
+    based on proprietary malware (DRM and snooping). In August 2015 
it</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of 
their</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded</em></ins></span> users <span class="removed"><del><strong>with 
third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>submit</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all the photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span class="inserted"><ins><em>increased 
snooping&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>keeps them up to date on all your devices.
+      Any edits you make</strong></del></span> <span 
class="inserted"><ins><em>some</em></ins></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>starting
+    to realize that it</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>nasty.&lt;/p&gt;
 
-    &lt;p&gt;This article shows the &lt;a
+    &lt;p&gt;This article shows</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude of the proprietary software industry
+    twisted ways that they present snooping as</em></ins></span> a way to 
<span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether they want that. This 
is</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span>
+    <span class="inserted"><ins><em>typical example</em></ins></span> of <span 
class="removed"><del><strong>this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span> <span class="inserted"><ins><em>the 
attitude</em></ins></span> of <span class="removed"><del><strong>many 
celebrities&lt;/a&gt;. They needed to break Apple's
+      security to get at them,</strong></del></span> <span 
class="inserted"><ins><em>the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -2077,7 +1853,7 @@
     proprietary apps, it was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
+    &ldquo;free&rdquo;,</em></ins></span> but <span 
class="removed"><del><strong>NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>most</em></ins></span> of them <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
     is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
@@ -2091,36 +1867,65 @@
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
-    &lt;p&gt;Widely used &lt;a
-    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-    the snooping done by the phone company, and perhaps by the OS in
+    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This 
is</em></ins></span> in <span 
class="removed"><del><strong>iThings:</strong></del></span> <span 
class="inserted"><ins><em>addition to</em></ins></span>
+    the <span class="removed"><del><strong>&lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>snooping done 
by</em></ins></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span class="inserted"><ins><em>phone 
company,</em></ins></span> and <span class="inserted"><ins><em>perhaps by the 
OS in
     the phone.&lt;/p&gt;
 
-    &lt;p&gt;Don't be distracted by the question of whether the app developers
-    get users to say &ldquo;I agree&rdquo;. That is no excuse for
-    malware.&lt;/p&gt;
+    &lt;p&gt;Don't be distracted by the question of whether the app 
developers</em></ins></span>
+    get <span class="removed"><del><strong>other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>users to say &ldquo;I agree&rdquo;. 
That</em></ins></span> is <span class="removed"><del><strong>also a 
feature</strong></del></span> <span class="inserted"><ins><em>no 
excuse</em></ins></span> for <span class="removed"><del><strong>web sites to 
track users,</strong></del></span>
+    <span class="inserted"><ins><em>malware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411260"&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.  &lt;a
-    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
-    as bad as what the others do.&lt;/p&gt;
+    report</em></ins></span> which <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>other apps the user has installed.</em></ins></span>  
&lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but 
it</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</em></ins></span>
+    is <span class="removed"><del><strong>still true</strong></del></span> 
<span class="inserted"><ins><em>doing this</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span class="inserted"><ins><em>a 
way</em></ins></span> that <span class="removed"><del><strong>can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>at least is visible</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>optional&lt;/a&gt;. Not
+    as bad as what</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>others do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201401150.1"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
     &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
     href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312270"&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
-    use of data on the user's computer, but it does surveillance too: &lt;a
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is to 
restrict</em></ins></span> the <span class="removed"><del><strong>NSA 
snoop</strong></del></span>
+    <span class="inserted"><ins><em>use of data</em></ins></span> on <span 
class="removed"><del><strong>all</strong></del></span> the <span 
class="removed"><del><strong>data in an iThing,
+      or</strong></del></span> <span class="inserted"><ins><em>user's 
computer, but</em></ins></span> it <span class="removed"><del><strong>is 
totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>does surveillance too: &lt;a
     
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of other people's phone
+    it tries to get the user's list</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>other people's phone
     numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2131,40 +1936,51 @@
 
     &lt;p&gt;The FTC criticized this app because it asked the user to
     approve sending personal data to the app developer but did not ask
-    about sending it to other companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+    about sending it</em></ins></span> to <span 
class="removed"><del><strong>exist for no
+      possible purpose</strong></del></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>companies.  This shows 
the weakness of</em></ins></span>
+    the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
-    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
+      sometimes very clever. Some trackers</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
+    &lt;p&gt;Skype refuses to say whether it</em></ins></span> can &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
+    &lt;p&gt;That almost certainly means it can do 
so.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307110"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307110"&gt;
     &lt;p&gt;Skype contains &lt;a
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-    specifically for spying&lt;/a&gt;.&lt;/p&gt;
+    specifically</em></ins></span> for <span 
class="removed"><del><strong>Google</strong></del></span> <span 
class="inserted"><ins><em>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2176,85 +1992,125 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908210"&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
-    
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Microsoft recorded users of Xboxes and had</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen to</em></ins></span> the <span 
class="removed"><del><strong>phone has</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Morally, we see</em></ins></span> no <span 
class="removed"><del><strong>SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Morally, we see no difference</em></ins></span> between <span 
class="removed"><del><strong>two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>having human workers listen and
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with</strong></del></span> <span 
class="inserted"><ins><em>difference between having human workers listen and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806240"&gt;
-    &lt;p&gt;Red Shell is a spyware that
+    &lt;p&gt;Red Shell is a</em></ins></span> spyware <span 
class="removed"><del><strong>sending lots of</strong></del></span> <span 
class="inserted"><ins><em>that
     is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
-    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>the massive
+    multiplayer game Guild Wars 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>turn the 
phones</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>and off, listen</strong></del></span> <span 
class="inserted"><ins><em>all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a
     
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information to China&lt;/a&gt;.&lt;/p&gt;
+    information</em></ins></span> to <span class="removed"><del><strong>the 
microphone, retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users and report to the
-    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
+    video game consoles snoop on their users</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>report to</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span>
+    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console is a computer, and you can't trust a computer with
-    a nonfree operating system.&lt;/p&gt;
+    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>designed to
+      disguise itself from investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a 
computer</em></ins></span> with
+    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their users'
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,</strong></del></span> and 
<span class="inserted"><ins><em>their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>send so much data</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks</em></ins></span> that 
<span class="removed"><del><strong>their transmission is a
+      substantial expense for users.  Said transmission, not wanted or
+      requested by</strong></del></span> <span 
class="inserted"><ins><em>merge</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
-    use a back door to manipulate the game play for specific players.&lt;/p&gt;
+    &ldquo;whales&rdquo; who can be led to spend a lot</em></ins></span> of 
<span class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;While the article describes gratis games, games that cost money
-    can use the same tactics.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens</strong></del></span> <span class="inserted"><ins><em>money. 
They also
+    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>voice all</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
+
+    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
+      Street Journal (in an</strong></del></span> article <span 
class="removed"><del><strong>blocked from us by a paywall)
+      reports</strong></del></span> <span class="inserted"><ins><em>describes 
gratis games, games</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI</strong></del></span> <span class="inserted"><ins><em>cost 
money</em></ins></span>
+    can <span class="removed"><del><strong>remotely 
activate</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="removed"><del><strong>GPS and microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>same 
tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
     &lt;p&gt;Angry Birds &lt;a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies, and the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
-    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200510200"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
     &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer and sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;
+    spies on every process running</em></ins></span> on
+      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>a gamer's computer</em></ins></span> and <span 
class="removed"><del><strong>users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to</strong></del></span> <span class="inserted"><ins><em>sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities 
which</em></ins></span>
+    have <span 
class="removed"><del><strong>GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nothing to do with 
cheating.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -2267,39 +2123,58 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to <span class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="inserted"><ins><em>people that</em></ins></span> use <span 
class="removed"><del><strong>of data on</strong></del></span> <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article uses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The moviepass app</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy</strong></del></span>
+<span class="inserted"><ins><em>said, &ldquo;Didn't I see 
you</em></ins></span> on <span class="removed"><del><strong>users even more 
than users
+      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that 
was</em></ins></span>
+before <span class="removed"><del><strong>and after 
going</strong></del></span> <span class="inserted"><ins><em>Amazon 
&ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202006250"&gt;
-    &lt;p&gt;TV manufacturers are able to &lt;a
-    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    &lt;p&gt;TV manufacturers are able</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop</em></ins></span>
+    every <span 
class="removed"><del><strong>move&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>second of what the user is watching&lt;/a&gt;. 
This is illegal due to
     the Video Privacy Protection Act of 1988, but they're circumventing
-    it through EULAs.&lt;/p&gt;
+    it through EULAs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
     collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
@@ -2307,28 +2182,48 @@
 
     &lt;p&gt;What is supposed to make this spying acceptable, according to him,
     is that it is opt-in in newer models. But since the Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
+    nonfree, we don't know what is actually happening behind the 
scenes,</em></ins></span>
+    and <span class="removed"><del><strong>email addresses&lt;/a&gt; in user's 
address
+      book to developer's server.  Note</strong></del></span> <span 
class="inserted"><ins><em>there is no guarantee</em></ins></span> that <span 
class="removed"><del><strong>this article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;
+    &lt;p&gt;Facebook's app listens</strong></del></span> all <span 
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
+    matter), the easiest way to make sure it isn't spying</em></ins></span> on 
<span class="removed"><del><strong>what people are 
listening</strong></del></span> <span class="inserted"><ins><em>you 
is</em></ins></span>
+    to <span class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>disconnect</em></ins></span> it <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
+    if you are technically oriented, is to get your own router (which 
can</em></ins></span>
+    be <span class="removed"><del><strong>analyzing people's 
conversations</strong></del></span> <span class="inserted"><ins><em>an old 
computer running completely free software), and set up a
+    firewall</em></ins></span> to <span class="removed"><del><strong>serve 
them</strong></del></span> <span class="inserted"><ins><em>block connections to 
Vizio's servers. Or, as a last resort,
+    you can replace your TV</em></ins></span> with <span 
class="removed"><del><strong>targeted
+    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article for the facts it presents. It
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that</strong></del></span> 
<span class="inserted"><ins><em>article for the facts</em></ins></span> it 
<span class="removed"><del><strong>will&lt;/a&gt;
+        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    moral weakness</em></ins></span> of <span class="removed"><del><strong>its 
phones.</strong></del></span> <span class="inserted"><ins><em>surrendering to 
Netflix.</em></ins></span> The <span 
class="inserted"><ins><em>Netflix</em></ins></span> app <span 
class="removed"><del><strong>will give Verizon the same
+   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2336,20 +2231,41 @@
   &lt;li id="M201702060"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports what it is. The existence of a way to disable the
-    surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
+    report everything</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently, the app</strong></del></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>viewed</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>them,</em></ins></span> and <span 
class="inserted"><ins><em>not just broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>image is coming 
from</em></ins></span> the <span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>user's own 
computer,</em></ins></span>
+    the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>TV reports what it is. The 
existence</em></ins></span> of <span class="removed"><del><strong>spyware is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to</strong></del></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>way to 
disable the
+    surveillance, even if it were</em></ins></span> not <span 
class="removed"><del><strong>only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data</strong></del></span> <span 
class="inserted"><ins><em>hidden as it was</em></ins></span> in <span 
class="inserted"><ins><em>these TVs,
+    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
+    &lt;p&gt;Some web</em></ins></span> and <span class="inserted"><ins><em>TV 
advertisements play inaudible
     sounds to be picked up by proprietary malware running
-    on other devices in range so as to determine that they
+    on other devices</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it</strong></del></span> <span 
class="inserted"><ins><em>range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and other &lt;a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    your TV, advertisers</em></ins></span> can
+  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>correlate ads with Web activity, and 
other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2357,8 +2273,8 @@
     &lt;p&gt;Vizio goes a step further than other TV
     manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers can track you
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span>
+    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track you
     across devices.&lt;/p&gt;
 
     &lt;p&gt;It is possible to turn this off, but having it enabled by default
@@ -2367,300 +2283,262 @@
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
+    to</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for</strong></del></span> <span class="inserted"><ins><em>company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;</em></ins></span>
+    users to new combined</em></ins></span> surveillance <span 
class="removed"><del><strong>is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>by default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>toys My Friend Cayla</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize</em></ins></span> and <span 
class="removed"><del><strong>i-Que transmit</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with</strong></del></span>
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
-      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops</em></ins></span> on <span class="removed"><del><strong>a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>what programs 
people watch,</em></ins></span> and even <span 
class="removed"><del><strong>speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops</em></ins></span> on what <span class="removed"><del><strong>radio 
and TV</strong></del></span> programs 
+      <span class="removed"><del><strong>are playing nearby&lt;/a&gt;.  
Also</strong></del></span> <span class="inserted"><ins><em>people watch, and 
even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs 
snoop</em></ins></span> on what
+    users <span class="removed"><del><strong>post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when 
first sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make</em></ins></span> its <span 
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
-    users <span class="removed"><del><strong>through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201502090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung 
&ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>US or some
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>internet</em></ins></span> to <span 
class="removed"><del><strong>who
+      is in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
+    Nuance can save it and would then have</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>give it</em></ins></span> to <span 
class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless</em></ins></span> 
it <span class="removed"><del><strong>was surrounded</strong></del></span> 
<span class="inserted"><ins><em>is done</em></ins></span> by <span 
class="removed"><del><strong>a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    &lt;p&gt;Speech recognition is not</em></ins></span> to be
+      <span class="removed"><del><strong>sent across the 
wire</strong></del></span> <span class="inserted"><ins><em>trusted unless it is 
done by free
+    software in your own computer.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than</strong></del></span> free
-    software <span class="removed"><del><strong>which users could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>in your own computer.&lt;/p&gt;
-
-    &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
+    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report</em></ins></span> was <span 
class="removed"><del><strong>sued for collecting lots</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
+    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products to get users' formal
-    consent before collecting personal</em></ins></span> data <span 
class="removed"><del><strong>may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>are totally inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>a
-      data broker,</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>data broker</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    &lt;p&gt;This shows that laws requiring products to get</em></ins></span> 
users' <span class="removed"><del><strong>pictures</strong></del></span> <span 
class="inserted"><ins><em>formal
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>private
+      anymore, even</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
+    And what happens</em></ins></span> if <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>declines consent? 
Probably the TV will
+    say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>have been able</strong></del></span> <span 
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to 
<span class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the
-    user <span class="removed"><del><strong>was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="inserted"><ins><em>report what</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>user watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access</strong></del></span>
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected by</strong></del></span> <span class="inserted"><ins><em>user 
watches, and</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>switch 
to turn this off has
-    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
-    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>server</em></ins></span> could <span 
class="removed"><del><strong>listen to these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting</strong></del></span> <span class="inserted"><ins><em>the 
switch</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
+    really means nothing; the server could save</em></ins></span> that <span 
class="inserted"><ins><em>data anyway.)&lt;/p&gt; 
   
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>is nasty.&lt;/p&gt;
 
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on</em></ins></span> the <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
-&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    product could spy this way.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
-      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else and to transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span> <span class="inserted"><ins><em>save that data 
anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>back door,</strong></del></span> <span 
class="inserted"><ins><em>patch to stop this,</em></ins></span> but <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>any
-    product</em></ins></span> could <span class="removed"><del><strong>be a
-      misunderstanding.  However, it is certainly surveillance, at
-      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spy this way.&lt;/p&gt;
-
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
+  &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    Crackers found</em></ins></span> a way to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>break security on</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo;</em></ins></span> devices 
<span class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;,</em></ins></span> 
which <span class="removed"><del><strong>other
+    apps</strong></del></span> <span class="inserted"><ins><em>save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
-    passes by,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
+    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span> <span 
class="inserted"><ins><em>video shows everyone</em></ins></span> that <span 
class="removed"><del><strong>at least is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>the user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>how Ring 
used</em></ins></span> to <span class="inserted"><ins><em>let individual 
employees look
+    at</em></ins></span> the <span class="removed"><del><strong>snooping done 
by the phone company, and perhaps by</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent that
+    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>OS in</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon 
gets</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>to let 
individual employees look
-    at the videos freely.  It appears Amazon has tried to prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+      &lt;p&gt;Don't be distracted by</strong></del></span>
+    <span class="inserted"><ins><em>video&mdash;Amazon expects society to 
surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
     &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
     
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>&ldquo;clean&rdquo; 
Windows install is</strong></del></span> <span class="inserted"><ins><em>better
+    give</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy</em></ins></span> of 
<span class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise</em></ins></span> not <span 
class="removed"><del><strong>really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>to look at 
what's</em></ins></span> in <span class="removed"><del><strong>its own 
malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>the videos. That's not
-    security for your home. Security means making</em></ins></span> sure <span 
class="inserted"><ins><em>they don't get</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+    manufacturers promise not to look at what's in</em></ins></span> the <span 
class="removed"><del><strong>app developers</strong></del></span> <span 
class="inserted"><ins><em>videos. That's not
+    security for your home. Security means making sure they 
don't</em></ins></span> get
+      <span class="removed"><del><strong>users</strong></del></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>see through your 
camera.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-  &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;The FTC criticized this app because it asked the user to
+      approve sending personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone</em></ins></span> to <span 
class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>to outsmart 
you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when</em></ins></span> the <span class="removed"><del><strong>app 
developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="removed"><del><strong>to other companies.  This shows the
+      weakness of</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+    to <span class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
+  &lt;li id="M201711244"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers to listen in on</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a 
<span class="removed"><del><strong>child's speech, and even 
speak</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote changes to the 
code could surely convert it</em></ins></span>
+    into <span class="inserted"><ins><em>one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;</em></ins></span>
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
@@ -2670,7 +2548,7 @@
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>statements about their
+    standard with which manufacturers would make statements about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
@@ -2686,167 +2564,280 @@
 
     &lt;p&gt;Following this lawsuit, &lt;a
     
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of 
C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo;</em></ins></span> toys with microphones 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
+    manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    conversations was unacceptable by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;An LG</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>watch is designed
+      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location to someone else</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>i-Que</em></ins></span> transmit
+       <span class="removed"><del><strong>conversations 
too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span class="removed"><del><strong>an 
unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but that could 
be</strong></del></span> <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;,</em></ins></span> a
+      <span class="removed"><del><strong>misunderstanding.  However, it is 
certainly surveillance, at
+      least.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>speech recognition
+    company based</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, 
if</strong></del></span> its <span class="removed"><del><strong>manufacturer 
can communicate</strong></del></span>
-    <span class="inserted"><ins><em>customers.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>it,
-      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>fact
-      that</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>device is tethered to a server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates that</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span 
class="removed"><del><strong>company
-      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest 
Cam</strong></del></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+      &lt;p&gt;Specifically, it</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers</em></ins></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>listen in on a child's speech, and even speak into the
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>remotely control</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>snoop on 
other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
+
+<span class="removed"><del><strong>&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201911190"&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had</em></ins></span>
-    a <span class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span class="inserted"><ins><em>security 
vulnerability that enabled attackers to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;</em></ins></span>
-    access <span class="removed"><del><strong>its computers 
remotely</strong></del></span> <span class="inserted"><ins><em>the user's wifi 
password&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>malware that bosses</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, 
so</em></ins></span> the <span class="removed"><del><strong>manufacturer, 
based</strong></del></span>
+    <span class="inserted"><ins><em>bosses can spy</em></ins></span> on <span 
class="inserted"><ins><em>these.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring</em></ins></span> the <span 
class="removed"><del><strong>fact
+      that the device</strong></del></span> <span 
class="inserted"><ins><em>user's &ldquo;consent&rdquo;</em></ins></span> is 
<span class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>almost 
anything, even probable exposure
+    to contageous disease that can be fatal.  Software like this should
+    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;That's easy to do because</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed</strong></del></span> <span 
class="inserted"><ins><em>household</em></ins></span>
-    through <span class="inserted"><ins><em>connected surveillance 
devices.&lt;/p&gt;
-
-    &lt;p&gt;Knowledge of</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>wifi password would not</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>sufficient to carry
-    out any significant surveillance if</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span class="inserted"><ins><em>devices 
implemented proper
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability</em></ins></span> that <span 
class="inserted"><ins><em>enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi 
password&lt;/a&gt;, and snoop on</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant</em></ins></span> surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>if the devices implemented proper
     security, including encryption. But many devices with proprietary
     software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;
+    manufacturers for snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when</em></ins></span> it <span class="removed"><del><strong>demands blind 
faith</strong></del></span> <span class="inserted"><ins><em>is not supposed to 
listen&lt;/a&gt;. Thus, when one of Google's
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
-    users were easily identified</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there</em></ins></span> is <span class="removed"><del><strong>&lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>no
+    way to see or control what</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>use of recordings, Google
+    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>these recordings.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
+    get commands that</em></ins></span> the user <span 
class="removed"><del><strong>reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is</em></ins></span> no <span class="removed"><del><strong>one 
connects</strong></del></span>
-    <span class="inserted"><ins><em>way to see or control what it records or 
sends.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span> <span 
class="inserted"><ins><em>wants</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;Rather than trying to better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google service.&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
-    it to Amazon's servers, which store it indefinitely. Even
-    worse, Amazon forwards it</em></ins></span> to <span 
class="inserted"><ins><em>third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, &lt;a
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
+    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
+    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
+    even if <span class="removed"><del><strong>it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
     
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    the data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>accessed by
     advertising companies and government agencies. In other words,
-    deleting the collected information doesn't cancel</em></ins></span> the 
<span class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>wrong of
+    deleting</em></ins></span> the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't 
cancel</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>cell phone
@@ -3754,7 +3745,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/09 08:02:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.330
retrieving revision 1.331
diff -u -b -r1.330 -r1.331
--- proprietary-surveillance.de.po      26 Jun 2020 23:31:13 -0000      1.330
+++ proprietary-surveillance.de.po      9 Jul 2020 08:02:16 -0000       1.331
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -4433,6 +4433,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-surveillance.es.po      27 Jun 2020 11:59:12 -0000      1.48
+++ proprietary-surveillance.es.po      9 Jul 2020 08:02:17 -0000       1.49
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-06-27 13:29+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -3842,6 +3843,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.510
retrieving revision 1.511
diff -u -b -r1.510 -r1.511
--- proprietary-surveillance.fr.po      27 Jun 2020 06:06:37 -0000      1.510
+++ proprietary-surveillance.fr.po      9 Jul 2020 08:02:17 -0000       1.511
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-06-27 08:05+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3848,6 +3849,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary-surveillance.it-diff.html       26 Jun 2020 23:31:13 -0000      
1.181
+++ proprietary-surveillance.it-diff.html       9 Jul 2020 08:02:17 -0000       
1.182
@@ -2715,6 +2715,19 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on these.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contageous disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201911190"&gt;
     &lt;p&gt;Internet-tethered Amazon Ring had
     a security vulnerability that enabled attackers to &lt;a
@@ -3532,7 +3545,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/09 08:02:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- proprietary-surveillance.it.po      26 Jun 2020 23:31:13 -0000      1.342
+++ proprietary-surveillance.it.po      9 Jul 2020 08:02:17 -0000       1.343
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -4183,6 +4183,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary-surveillance.ja-diff.html       26 Jun 2020 23:31:13 -0000      
1.198
+++ proprietary-surveillance.ja-diff.html       9 Jul 2020 08:02:17 -0000       
1.199
@@ -2660,6 +2660,19 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on these.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contageous disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201911190"&gt;
     &lt;p&gt;Internet-tethered Amazon Ring had
     a security vulnerability that enabled attackers to &lt;a
@@ -3373,7 +3386,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/09 08:02:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.324
retrieving revision 1.325
diff -u -b -r1.324 -r1.325
--- proprietary-surveillance.ja.po      26 Jun 2020 23:31:13 -0000      1.324
+++ proprietary-surveillance.ja.po      9 Jul 2020 08:02:17 -0000       1.325
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -3278,6 +3278,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary-surveillance.pot        26 Jun 2020 23:31:13 -0000      1.263
+++ proprietary-surveillance.pot        9 Jul 2020 08:02:17 -0000       1.264
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2603,6 +2603,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a "
+"href=\"https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\";>
 "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a "
 
"href=\"https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\";>
 "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.606
retrieving revision 1.607
diff -u -b -r1.606 -r1.607
--- proprietary-surveillance.ru.po      27 Jun 2020 07:59:02 -0000      1.606
+++ proprietary-surveillance.ru.po      9 Jul 2020 08:02:17 -0000       1.607
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3807,6 +3808,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Internet-tethered Amazon Ring had a security vulnerability that enabled "
 "attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/";
 "amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary.de-diff.html    1 Jul 2020 14:02:13 -0000       1.158
+++ proprietary.de-diff.html    9 Jul 2020 08:02:17 -0000       1.159
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,9 +57,8 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,8 +69,9 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -153,17 +153,17 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -188,10 +188,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -212,6 +212,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202007010"&gt;
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; through a universal
+    back door.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on these.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contageous disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201504210"&gt;
     &lt;p&gt;Runescape is a popular online game with some &lt;a
     
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
@@ -245,28 +265,6 @@
     the Video Privacy Protection Act of 1988, but they're circumventing
     it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202006160"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous security bug&lt;/a&gt; touches millions of products in the
-    Internet of Stings.&lt;/p&gt;
-
-    &lt;p&gt;As a result, anyone can sting the user, not only the
-    manufacturer.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909061"&gt;
-    &lt;p&gt;Best Buy made controllable appliances and &lt;a
-    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
-    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
-    the customers by doing so, this doesn't alter the facts that
-    tethering the device to a particular server is a path to screwing the
-    users, and that it is a consequence of having nonfree software in the
-    device.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -329,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/01 14:02:13 $
+$Date: 2020/07/09 08:02:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary.de.po   1 Jul 2020 14:02:13 -0000       1.199
+++ proprietary.de.po   9 Jul 2020 08:02:17 -0000       1.200
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -489,34 +513,6 @@
 "Act of 1988, but they're circumventing it through EULAs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary.es.po   3 Jul 2020 10:00:44 -0000       1.284
+++ proprietary.es.po   9 Jul 2020 08:02:17 -0000       1.285
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -312,6 +313,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -371,48 +396,6 @@
 "1988, esto es ilegal, pero eluden la ley mediante acuerdos de licencia de "
 "usuario final."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\">Un desastroso fallo "
-"de seguridad</a> afecta a millones de productos del Internet de las Trucosas."
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-"A consecuencia de esto, cualquiera puede atacar al usuario, no solo el "
-"fabricante."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"Best Buy produjo electrodomésticos controlables y luego <a href=\"https://";
-"www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-"
-"freezer-mobile-app-shutdown-november-6\"> cerró el servicio que permitía "
-"controlarlos</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"Si bien es loable que Best Buy haya reconocido que al hacerlo estaba "
-"maltratando a los usuarios, esto no cambia el hecho de que vincular un "
-"aparato a un servidor determinado es una forma de aprisionar a los usuarios, "
-"y es una consecuencia de tener en el aparato software que no es libre."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -492,3 +475,44 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\">Un desastroso fallo de seguridad</a> afecta a millones de productos "
+#~ "del Internet de las Trucosas."
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr ""
+#~ "A consecuencia de esto, cualquiera puede atacar al usuario, no solo el "
+#~ "fabricante."
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "Best Buy produjo electrodomésticos controlables y luego <a 
href=\"https://";
+#~ "www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-"
+#~ "wifi-freezer-mobile-app-shutdown-november-6\"> cerró el servicio que "
+#~ "permitía controlarlos</a>."
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ "Si bien es loable que Best Buy haya reconocido que al hacerlo estaba "
+#~ "maltratando a los usuarios, esto no cambia el hecho de que vincular un "
+#~ "aparato a un servidor determinado es una forma de aprisionar a los "
+#~ "usuarios, y es una consecuencia de tener en el aparato software que no es "
+#~ "libre."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- proprietary.fr.po   1 Jul 2020 16:13:45 -0000       1.329
+++ proprietary.fr.po   9 Jul 2020 08:02:17 -0000       1.330
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-07-01 18:13+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -308,6 +309,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -368,49 +393,6 @@
 "(Video Privacy Protection Act)</cite> rend ceci illégal aux États-Unis, 
mais "
 "ils la contournent avec leurs conditions générales d'utilisation."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\">Une faille de "
-"sécurité désastreuse</a> touche des millions de produits connectés."
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-"De ce fait, n'importe qui peut attaquer l'utilisateur, pas seulement le "
-"fabricant."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"Best Buy a mis sur le marché des appareils contrôlables à distance, puis a 
"
-"<a href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-";
-"insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\">arrêté le 
"
-"service qui permettait de les contrôler</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"Bien qu'on puisse féliciter Best Buy d'avoir reconnu ses torts envers ses "
-"clients dans cette affaire, il n'en reste pas moins que la dépendance d'un "
-"appareil à un serveur particulier conduit naturellement à ce que les "
-"utilisateurs se fassent avoir un jour ou l'autre. C'est une conséquence du "
-"fait que l'appareil fonctionne avec du logiciel privateur."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -485,6 +467,47 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\">Une faille de sécurité désastreuse</a> touche des millions de "
+#~ "produits connectés."
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr ""
+#~ "De ce fait, n'importe qui peut attaquer l'utilisateur, pas seulement le "
+#~ "fabricant."
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "Best Buy a mis sur le marché des appareils contrôlables à distance, 
puis "
+#~ "a <a href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-";
+#~ "insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\">arrêté 
"
+#~ "le service qui permettait de les contrôler</a>."
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ "Bien qu'on puisse féliciter Best Buy d'avoir reconnu ses torts envers ses 
"
+#~ "clients dans cette affaire, il n'en reste pas moins que la dépendance "
+#~ "d'un appareil à un serveur particulier conduit naturellement à ce que 
les "
+#~ "utilisateurs se fassent avoir un jour ou l'autre. C'est une conséquence "
+#~ "du fait que l'appareil fonctionne avec du logiciel privateur."
+
+#~ msgid ""
 #~ "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. "
 #~ "In May 2020, it ordered the purchasers to start <a href=\"https://www.";
 #~ "techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-"

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.it-diff.html    1 Jul 2020 14:02:13 -0000       1.170
+++ proprietary.it-diff.html    9 Jul 2020 08:02:17 -0000       1.171
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,7 +57,7 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
@@ -65,7 +65,7 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
@@ -211,6 +211,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202007010"&gt;
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; through a universal
+    back door.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on these.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contageous disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201504210"&gt;
     &lt;p&gt;Runescape is a popular online game with some &lt;a
     
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
@@ -244,28 +264,6 @@
     the Video Privacy Protection Act of 1988, but they're circumventing
     it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202006160"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous security bug&lt;/a&gt; touches millions of products in the
-    Internet of Stings.&lt;/p&gt;
-
-    &lt;p&gt;As a result, anyone can sting the user, not only the
-    manufacturer.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909061"&gt;
-    &lt;p&gt;Best Buy made controllable appliances and &lt;a
-    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
-    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
-    the customers by doing so, this doesn't alter the facts that
-    tethering the device to a particular server is a path to screwing the
-    users, and that it is a consequence of having nonfree software in the
-    device.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -328,7 +326,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/01 14:02:13 $
+$Date: 2020/07/09 08:02:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.208
retrieving revision 1.209
diff -u -b -r1.208 -r1.209
--- proprietary.it.po   1 Jul 2020 14:02:13 -0000       1.208
+++ proprietary.it.po   9 Jul 2020 08:02:17 -0000       1.209
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -493,34 +517,6 @@
 "Act of 1988, but they're circumventing it through EULAs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary.ja-diff.html    1 Jul 2020 14:02:13 -0000       1.174
+++ proprietary.ja-diff.html    9 Jul 2020 08:02:17 -0000       1.175
@@ -55,7 +55,7 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
@@ -63,7 +63,7 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -122,47 +122,50 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+   &lt;ul class="columns"&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html"&gt;Malware
 in the Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;div class="malfunctions"&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a
 href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;
 to
+servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-<span class="removed"><del><strong>&lt;/div&gt;
-
-&lt;div class="malfunctions"&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;/td&gt;
-  &lt;td&gt;</em></ins></span>
+  &lt;/td&gt;
+  &lt;td&gt;
    &lt;ul&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -170,9 +173,7 @@
   &lt;td colspan="2"&gt;
    &lt;ol&gt;
     &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any feature of a 
program
-     that enables someone who is not supposed</em></ins></span> to
-<span class="removed"><del><strong>servers&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>be in control of the
+     that enables someone who is not supposed to be in control of the
      computer where it is installed to send it commands.&lt;/li&gt;
 
     &lt;li id="f2"&gt;&lt;em&gt;Digital</em></ins></span> restrictions
@@ -185,10 +186,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -208,6 +209,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202007010"&gt;
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; through a universal
+    back door.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on these.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contageous disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201504210"&gt;
     &lt;p&gt;Runescape is a popular online game with some &lt;a
     
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
@@ -241,28 +262,6 @@
     the Video Privacy Protection Act of 1988, but they're circumventing
     it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202006160"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous security bug&lt;/a&gt; touches millions of products in the
-    Internet of Stings.&lt;/p&gt;
-
-    &lt;p&gt;As a result, anyone can sting the user, not only the
-    manufacturer.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909061"&gt;
-    &lt;p&gt;Best Buy made controllable appliances and &lt;a
-    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
-    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
-    the customers by doing so, this doesn't alter the facts that
-    tethering the device to a particular server is a path to screwing the
-    users, and that it is a consequence of having nonfree software in the
-    device.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -325,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/01 14:02:13 $
+$Date: 2020/07/09 08:02:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary.ja.po   1 Jul 2020 14:02:13 -0000       1.192
+++ proprietary.ja.po   9 Jul 2020 08:02:17 -0000       1.193
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -354,34 +378,6 @@
 "Act of 1988, but they're circumventing it through EULAs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- proprietary.nl-diff.html    1 Jul 2020 14:02:13 -0000       1.171
+++ proprietary.nl-diff.html    9 Jul 2020 08:02:17 -0000       1.172
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,9 +57,8 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,8 +69,9 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -211,6 +211,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202007010"&gt;
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; through a universal
+    back door.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on these.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contageous disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201504210"&gt;
     &lt;p&gt;Runescape is a popular online game with some &lt;a
     
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
@@ -244,28 +264,6 @@
     the Video Privacy Protection Act of 1988, but they're circumventing
     it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202006160"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous security bug&lt;/a&gt; touches millions of products in the
-    Internet of Stings.&lt;/p&gt;
-
-    &lt;p&gt;As a result, anyone can sting the user, not only the
-    manufacturer.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909061"&gt;
-    &lt;p&gt;Best Buy made controllable appliances and &lt;a
-    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
-    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
-    the customers by doing so, this doesn't alter the facts that
-    tethering the device to a particular server is a path to screwing the
-    users, and that it is a consequence of having nonfree software in the
-    device.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -328,7 +326,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/01 14:02:13 $
+$Date: 2020/07/09 08:02:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.nl.po   1 Jul 2020 14:02:13 -0000       1.182
+++ proprietary.nl.po   9 Jul 2020 08:02:17 -0000       1.183
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -363,6 +363,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -397,34 +421,6 @@
 "Act of 1988, but they're circumventing it through EULAs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary.pl-diff.html    1 Jul 2020 14:02:14 -0000       1.188
+++ proprietary.pl-diff.html    9 Jul 2020 08:02:17 -0000       1.189
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -56,14 +56,14 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -155,16 +155,16 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -186,10 +186,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -209,6 +209,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202007010"&gt;
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; through a universal
+    back door.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on these.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contageous disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201504210"&gt;
     &lt;p&gt;Runescape is a popular online game with some &lt;a
     
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
@@ -242,28 +262,6 @@
     the Video Privacy Protection Act of 1988, but they're circumventing
     it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202006160"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous security bug&lt;/a&gt; touches millions of products in the
-    Internet of Stings.&lt;/p&gt;
-
-    &lt;p&gt;As a result, anyone can sting the user, not only the
-    manufacturer.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909061"&gt;
-    &lt;p&gt;Best Buy made controllable appliances and &lt;a
-    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
-    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
-    the customers by doing so, this doesn't alter the facts that
-    tethering the device to a particular server is a path to screwing the
-    users, and that it is a consequence of having nonfree software in the
-    device.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -326,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/01 14:02:14 $
+$Date: 2020/07/09 08:02:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary.pl.po   1 Jul 2020 14:02:14 -0000       1.175
+++ proprietary.pl.po   9 Jul 2020 08:02:17 -0000       1.176
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -540,6 +540,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -574,34 +598,6 @@
 "Act of 1988, but they're circumventing it through EULAs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary.pot     1 Jul 2020 14:02:14 -0000       1.172
+++ proprietary.pot     9 Jul 2020 08:02:17 -0000       1.173
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -257,6 +257,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a "
+"href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/\";> "
+"enable and disable functionality in cars</a> through a universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a "
+"href=\"https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\";>
 "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a "
 
"href=\"https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\";>
 "
 "addictive features</a> derived from <a "
@@ -292,33 +316,6 @@
 "EULAs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\";>
 "
-"A disasterous security bug</a> touches millions of products in the Internet "
-"of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a "
-"href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\";>
 "
-"shut down the service to control them through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary.pt-br.po        1 Jul 2020 14:02:14 -0000       1.305
+++ proprietary.pt-br.po        9 Jul 2020 08:02:17 -0000       1.306
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-06-30 08:27-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -306,6 +306,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -354,47 +378,6 @@
 "usuário está assistindo</a>. Isso é ilegal devido à Lei de Proteção à "
 "Privacidade de Vídeo de 1988, mas está sendo contornada por meio de EULAs."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> Um erro de segurança 
"
-"desastroso</a> afeta milhões de produtos conectados"
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-"Como resultado, qualquer um pode atacar o usuário, não apenas o fabricante."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"A Best Buy fabricou aparelhos controláveis e <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> encerrou o serviço que permitia controlá-"
-"los</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"Embora seja louvável que a Best Buy tenha reconhecido que estava maltratando 
"
-"os clientes, isso não altera os fatos de que amarrar o dispositivo a um "
-"servidor específico é um caminho para atrapalhar os usuários e que é uma "
-"consequência de ter um software não livre no dispositivo."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -470,6 +453,47 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\"> Um erro de segurança desastroso</a> afeta milhões de produtos "
+#~ "conectados"
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr ""
+#~ "Como resultado, qualquer um pode atacar o usuário, não apenas o "
+#~ "fabricante."
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "A Best Buy fabricou aparelhos controláveis e <a href=\"https://www.";
+#~ "theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-"
+#~ "freezer-mobile-app-shutdown-november-6\"> encerrou o serviço que permitia 
"
+#~ "controlá-los</a>."
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ "Embora seja louvável que a Best Buy tenha reconhecido que estava "
+#~ "maltratando os clientes, isso não altera os fatos de que amarrar o "
+#~ "dispositivo a um servidor específico é um caminho para atrapalhar os "
+#~ "usuários e que é uma consequência de ter um software não livre no "
+#~ "dispositivo."
+
+#~ msgid ""
 #~ "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. "
 #~ "In May 2020, it ordered the purchasers to start <a href=\"https://www.";
 #~ "techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-"

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.363
retrieving revision 1.364
diff -u -b -r1.363 -r1.364
--- proprietary.ru.po   1 Jul 2020 17:03:01 -0000       1.363
+++ proprietary.ru.po   9 Jul 2020 08:02:17 -0000       1.364
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -312,6 +313,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -370,47 +395,6 @@
 "частной жизни в отношении видео&rdquo; 
делает это незаконным, но они обходят "
 "это с помощью соглашений с пользователем."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> 
Катастрофическая "
-"ошибка в защите</a> затрагивает миллионы 
продуктов в Интернете клещей."
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-"В результате ужалить пользователя может 
любой, а не только изготовитель."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"Компания Best Buy выпустила управляемые 
бытовые устройства и <a href="
-"\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-";
-"plug-wifi-freezer-mobile-app-shutdown-november-6\"> прекратила 
работу "
-"службы, через которую они управлялись</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"Хотя со стороны Best Buy похвально, что 
компания признала, что это было "
-"несправедливо в отношении клиентов, но 
это не изменяет того факта, что "
-"привязка устройства к конкретному 
серверу&nbsp;&mdash; первый шаг к обману "
-"пользователей, благодаря тому, что на 
устройстве стоят несвободные программы."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -487,6 +471,46 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\"> Катастрофическая ошибка в защите</a> 
затрагивает миллионы "
+#~ "продуктов в Интернете клещей."
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr ""
+#~ "В результате ужалить пользователя может 
любой, а не только изготовитель."
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "Компания Best Buy выпустила управляемые 
бытовые устройства и <a href="
+#~ "\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-";
+#~ "smart-plug-wifi-freezer-mobile-app-shutdown-november-6\"> 
прекратила "
+#~ "работу службы, через которую они 
управлялись</a>."
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ "Хотя со стороны Best Buy похвально, что 
компания признала, что это было "
+#~ "несправедливо в отношении клиентов, но 
это не изменяет того факта, что "
+#~ "привязка устройства к конкретному 
серверу&nbsp;&mdash; первый шаг к "
+#~ "обману пользователей, благодаря тому, 
что на устройстве стоят несвободные "
+#~ "программы."
+
+#~ msgid ""
 #~ "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. "
 #~ "In May 2020, it ordered the purchasers to start <a href=\"https://www.";
 #~ "techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-"

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary.tr.po   1 Jul 2020 16:23:52 -0000       1.31
+++ proprietary.tr.po   9 Jul 2020 08:02:17 -0000       1.32
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-07-01 18:03+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.3\n"
 
@@ -305,6 +306,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -362,46 +387,6 @@
 "Yasası'na göre yasadışı, fakat son kullanıcı lisans anlaşmaları 
(EULA) "
 "aracılığıyla bu yasayı geçiştiriyorlar."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/";
-"\">Felaket bir güvenlik açığı</a> İğnelerin İnternetindeki 
milyonlarca ürüne "
-"zarar veriyor."
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-"Sonuç olarak, salt üretici değil herhangi bir kimse kullanıcıyı 
sokabiliyor."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"Best Buy kontrol edilebilir gereçler yapıyor ve <a href=\"https://www.";
-"theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-"
-"freezer-mobile-app-shutdown-november-6\"> onları denetlediği hizmeti "
-"kapattı</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"Best Buy'ın müşterilere bu şekilde kötü davrandığını kabul etmesi 
takdire "
-"şayan olsa da, bir aygıtı belirli bir sunucuya bağlamanın 
kullanıcıları "
-"aldatmaya doğru bir yol olduğu ve bu durumun aygıtta özgür olmayan 
yazılım "
-"olmasının bir sonucu olduğu gerçeğini değiştirmiyor."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -482,6 +467,44 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/";
+#~ "\">Felaket bir güvenlik açığı</a> İğnelerin İnternetindeki 
milyonlarca "
+#~ "ürüne zarar veriyor."
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr ""
+#~ "Sonuç olarak, salt üretici değil herhangi bir kimse kullanıcıyı "
+#~ "sokabiliyor."
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "Best Buy kontrol edilebilir gereçler yapıyor ve <a href=\"https://www.";
+#~ "theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-"
+#~ "freezer-mobile-app-shutdown-november-6\"> onları denetlediği hizmeti "
+#~ "kapattı</a>."
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ "Best Buy'ın müşterilere bu şekilde kötü davrandığını kabul 
etmesi takdire "
+#~ "şayan olsa da, bir aygıtı belirli bir sunucuya bağlamanın 
kullanıcıları "
+#~ "aldatmaya doğru bir yol olduğu ve bu durumun aygıtta özgür olmayan "
+#~ "yazılım olmasının bir sonucu olduğu gerçeğini değiştirmiyor."
+
+#~ msgid ""
 #~ "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. "
 #~ "In May 2020, it ordered the purchasers to start <a href=\"https://www.";
 #~ "techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-"

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary.zh-cn.po        1 Jul 2020 14:02:14 -0000       1.29
+++ proprietary.zh-cn.po        9 Jul 2020 08:02:17 -0000       1.30
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-06-27 12:24+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -289,6 +289,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -333,44 +357,6 @@
 "年的视频隐私保护法案(Video Privacy Protection Act),这æ 
·åšæ—¶è¿æ³•çš„,但是厂"
 "商们通过 EULA<sup><a href=\"#TransNote1\">1</a></sup> 
设法规避过去了。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\">一个灾难性安å…
¨ç¼ºé™·</"
-"a> 波及数百万 Internet of Stings<sup><a href=\"#TransNote2\">2</a></sup> 
产"
-"品。"
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr "å…
¶åŽæžœæ˜¯ï¼Œæ¯ä¸ªäººéƒ½å¯ä»¥ä¼¤å®³ç”¨æˆ·ï¼Œè€Œå¹¶éžåªæœ‰è®¾å¤‡åˆ¶é€ å•†ã€‚"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"百思买(Best Buy)制造了一些可控工具却 <a 
href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\">关停了服务来控制它们</a>。"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"虽然百思买自己也意识到这是对用户的伤害——这一点值得赞扬,但是这并没有改变把设"
-"备和服务器绑定是玩弄用户的事实,而这正是设备中使用非自由软件的后果。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -455,6 +441,41 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;"
+#~ "esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran"
+#~ "%5C\">一个灾难性安全缺陷</a> 波及数百万 Internet of 
Stings<sup><a href="
+#~ "\"#TransNote2\">2</a></sup> 产品。"
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr "å…
¶åŽæžœæ˜¯ï¼Œæ¯ä¸ªäººéƒ½å¯ä»¥ä¼¤å®³ç”¨æˆ·ï¼Œè€Œå¹¶éžåªæœ‰è®¾å¤‡åˆ¶é€ å•†ã€‚"
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge.";
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "百思买(Best Buy)制造了一些可控工具却 <a 
href=\"https://www.theverge.";
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\">关停了服务来控制它们</a>。"
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ 
"虽然百思买自己也意识到这是对用户的伤害——这一点值得赞扬,但是这并没有改变把"
+#~ 
"设备和服务器绑定是玩弄用户的事实,而这正是设备中使用非自由软件的后果。"
+
+#~ msgid ""
 #~ "Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. "
 #~ "In May 2020, it ordered the purchasers to start <a href=\"https://www.";
 #~ "techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-"

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary.zh-tw-diff.html 1 Jul 2020 14:02:14 -0000       1.151
+++ proprietary.zh-tw-diff.html 9 Jul 2020 08:02:17 -0000       1.152
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,9 +57,8 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,8 +69,9 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -153,17 +153,17 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -188,10 +188,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -212,6 +212,26 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202007010"&gt;
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; through a universal
+    back door.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on these.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contageous disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201504210"&gt;
     &lt;p&gt;Runescape is a popular online game with some &lt;a
     
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
@@ -245,28 +265,6 @@
     the Video Privacy Protection Act of 1988, but they're circumventing
     it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202006160"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous security bug&lt;/a&gt; touches millions of products in the
-    Internet of Stings.&lt;/p&gt;
-
-    &lt;p&gt;As a result, anyone can sting the user, not only the
-    manufacturer.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909061"&gt;
-    &lt;p&gt;Best Buy made controllable appliances and &lt;a
-    
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"&gt;
-    shut down the service to control them through&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;While it is laudable that Best Buy recognized it was mistreating
-    the customers by doing so, this doesn't alter the facts that
-    tethering the device to a particular server is a path to screwing the
-    users, and that it is a consequence of having nonfree software in the
-    device.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -329,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/01 14:02:14 $
+$Date: 2020/07/09 08:02:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.zh-tw.po        1 Jul 2020 14:02:14 -0000       1.162
+++ proprietary.zh-tw.po        9 Jul 2020 08:02:17 -0000       1.163
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -433,6 +433,30 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Runescape is a popular online game with some <a href=\"https://www.reddit.";
 "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
 "addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -467,34 +491,6 @@
 "Act of 1988, but they're circumventing it through EULAs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?";
-"bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge.";
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- pt-br.po    1 Jul 2020 14:02:14 -0000       1.254
+++ pt-br.po    9 Jul 2020 08:02:17 -0000       1.255
@@ -3023,6 +3023,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -8584,6 +8591,23 @@
 msgid "Latest additions"
 msgstr "Últimas adições"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.422
retrieving revision 1.423
diff -u -b -r1.422 -r1.423
--- ru.po       1 Jul 2020 16:25:23 -0000       1.422
+++ ru.po       9 Jul 2020 08:02:17 -0000       1.423
@@ -3692,6 +3692,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -4489,14 +4496,15 @@
 "becoming a paying member, and can thus encourage children and impressionable "
 "people to spend money on the game."
 msgstr ""
-"Runescape&nbsp;&mdash; популярная сетевая игра с 
некоторыми <a href=\"https://www.reddit.";
-"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
-"вызывающими зависимость особенностями</a>, 
основанными на <a href=\"/proprietary/proprietary-"
+"Runescape&nbsp;&mdash; популярная сетевая игра с 
некоторыми <a href="
+"\"https://www.reddit.com/r/runescape/comments/33cd8g/";
+"question_why_is_runescape_so_addicting/\"> вызывающими 
зависимость "
+"особенностями</a>, основанными на <a 
href=\"/proprietary/proprietary-"
 "addictions.html#addictiveness\"> технике манипуляции 
поведением</a>. "
-"Определенные повторяющиеся аспекты игры, 
такие как <a href=\"https://en.wikipedia.";
-"org/wiki/Grinding_(video_games)\"> шлифование</a>, можно 
свести к минимуму, став "
-"платным членом, и таким образом можно 
поощрять трату денег на игру детьми и "
-"впечатлительными людьми."
+"Определенные повторяющиеся аспекты игры, 
такие как <a href=\"https://en.";
+"wikipedia.org/wiki/Grinding_(video_games)\"> шлифование</a>, 
можно свести к "
+"минимуму, став платным членом, и таким 
образом можно поощрять трату денег на "
+"игру детьми и впечатлительными людьми."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -10432,6 +10440,23 @@
 msgid "Latest additions"
 msgstr "Последние добавления"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- tr.po       1 Jul 2020 16:32:18 -0000       1.27
+++ tr.po       9 Jul 2020 08:02:17 -0000       1.28
@@ -2641,6 +2641,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -7534,6 +7541,23 @@
 msgid "Latest additions"
 msgstr "Son eklenenler"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- zh-cn.po    1 Jul 2020 14:02:14 -0000       1.23
+++ zh-cn.po    9 Jul 2020 08:02:17 -0000       1.24
@@ -2642,6 +2642,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -7321,6 +7328,23 @@
 msgid "Latest additions"
 msgstr "最新添加"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #
 #
 #

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- zh-tw.po    1 Jul 2020 14:02:14 -0000       1.191
+++ zh-tw.po    9 Jul 2020 08:02:18 -0000       1.192
@@ -2704,6 +2704,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-";
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
 "run-on-the-new-oil.html\"> record and send various kinds of data to the "
 "manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -7560,6 +7567,23 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's &ldquo;consent&rdquo; is not an adequate "
+"basis for protecting digital privacy.  The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal.  Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
 #
 #
 #



reply via email to

[Prev in Thread] Current Thread [Next in Thread]