www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www distros/po/free-distros.ar.po distros/po/fr...


From: GNUN
Subject: www distros/po/free-distros.ar.po distros/po/fr...
Date: Fri, 17 Jul 2020 15:02:17 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/07/17 15:02:16

Modified files:
        distros/po     : free-distros.ar.po free-distros.ca-diff.html 
                         free-distros.ca.po free-distros.de.po 
                         free-distros.es.po free-distros.fr.po 
                         free-distros.hr-diff.html free-distros.hr.po 
                         free-distros.it-diff.html free-distros.it.po 
                         free-distros.ja.po free-distros.nl-diff.html 
                         free-distros.nl.po free-distros.pl-diff.html 
                         free-distros.pl.po free-distros.pot 
                         free-distros.pt-br.po free-distros.ro-diff.html 
                         free-distros.ro.po free-distros.ru.po 
                         free-distros.sk.po free-distros.tr.po 
                         free-distros.uk-diff.html free-distros.uk.po 
                         free-distros.zh-cn.po free-distros.zh-tw.po 
        fry/po         : happy-birthday-to-gnu.ar.po 
                         happy-birthday-to-gnu.de.po 
                         happy-birthday-to-gnu.fr.po 
                         happy-birthday-to-gnu.pot 
                         happy-birthday-to-gnu.pt-br.po 
                         happy-birthday-to-gnu.sq.po 
        philosophy/po  : microsoft-new-monopoly.ca.po 
                         microsoft-new-monopoly.es.po 
                         microsoft-new-monopoly.fr.po 
                         microsoft-new-monopoly.nl.po 
                         microsoft-new-monopoly.pl.po 
                         microsoft-new-monopoly.pot 
                         microsoft-new-monopoly.ru.po 
                         surveillance-vs-democracy.es.po 
                         surveillance-vs-democracy.fr.po 
                         surveillance-vs-democracy.it-diff.html 
                         surveillance-vs-democracy.it.po 
                         surveillance-vs-democracy.ja.po 
                         surveillance-vs-democracy.lt-diff.html 
                         surveillance-vs-democracy.lt.po 
                         surveillance-vs-democracy.ml-diff.html 
                         surveillance-vs-democracy.ml.po 
                         surveillance-vs-democracy.nl-diff.html 
                         surveillance-vs-democracy.nl.po 
                         surveillance-vs-democracy.pot 
                         surveillance-vs-democracy.pt-br.po 
                         surveillance-vs-democracy.ru.po 
                         surveillance-vs-democracy.sq.po 
                         surveillance-vs-democracy.tr.po 
                         surveillance-vs-democracy.uk-diff.html 
                         surveillance-vs-democracy.uk.po 
                         surveillance-vs-democracy.zh-cn.po 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ar.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ca-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ca.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.de.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.es.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.fr.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.hr-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.hr.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.it.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ja.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.nl-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.nl.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.pl-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.pl.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.pot?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.pt-br.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ro-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ro.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ru.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.sk.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.tr.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.uk-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.uk.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.zh-cn.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.zh-tw.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.ar.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.de.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.fr.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.pot?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.pt-br.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.sq.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.ca.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.es.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.fr.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.nl.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.pl.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.ru.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.es.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ml-diff.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ml.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pot?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pt-br.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.sq.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.tr.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.346&r2=1.347
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.514&r2=1.515
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.344&r2=1.345
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.610&r2=1.611
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.372&r2=1.373
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.434&r2=1.435
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.196&r2=1.197

Patches:
Index: distros/po/free-distros.ar.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ar.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- distros/po/free-distros.ar.po       6 Feb 2020 16:00:36 -0000       1.111
+++ distros/po/free-distros.ar.po       17 Jul 2020 19:02:11 -0000      1.112
@@ -10,7 +10,7 @@
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2009-09-02 21:48+0200\n"
 "Last-Translator: Hossam Hossny <hossam@gnu.org>\n"
 "Language-Team: Arabic\n"
@@ -535,7 +535,14 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.ca-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ca-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- distros/po/free-distros.ca-diff.html        26 Apr 2020 14:29:00 -0000      
1.35
+++ distros/po/free-distros.ca-diff.html        17 Jul 2020 19:02:11 -0000      
1.36
@@ -308,7 +308,7 @@
   &lt;/tr&gt;&lt;/thead&gt;
 
   &lt;tr class="odd"&gt;
-   &lt;td class="icon"&gt;&lt;a href="http://www.blagblagblag.org/"&gt;
+   &lt;td class="icon"&gt;&lt;a 
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/"&gt;
        &lt;img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU" 
/&gt;&lt;/a&gt;&lt;/td&gt;
    &lt;td&gt;BLAG Linux and GNU, a GNU/Linux distribution based on 
Fedora.&lt;/td&gt;
    &lt;td&gt;&lt;em&gt;Removed June 2018&lt;/em&gt;. Removed at the request of 
the
@@ -384,7 +384,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: distros/po/free-distros.ca.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ca.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- distros/po/free-distros.ca.po       6 Feb 2020 16:00:36 -0000       1.145
+++ distros/po/free-distros.ca.po       17 Jul 2020 19:02:11 -0000      1.146
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: free-distros.ca\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2016-09-17 08:50+0200\n"
 "Last-Translator: Miquel Puigpelat <mpuigpe1@xtec.cat>\n"
 "Language-Team: Catalan <www-ca-traductors@gnu.org>\n"
@@ -546,7 +546,14 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.de.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.de.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- distros/po/free-distros.de.po       27 Apr 2020 08:30:40 -0000      1.144
+++ distros/po/free-distros.de.po       17 Jul 2020 19:02:11 -0000      1.145
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-11-20 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -512,7 +513,14 @@
 msgstr "Informationen zur Stilllegung"
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"\">"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.es.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.es.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- distros/po/free-distros.es.po       7 Feb 2020 12:21:01 -0000       1.193
+++ distros/po/free-distros.es.po       17 Jul 2020 19:02:11 -0000      1.194
@@ -12,7 +12,7 @@
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -20,6 +20,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 
 # type: Content of: <title>
@@ -542,7 +543,14 @@
 
 # type: Content of: <table><tr><td><a>
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.fr.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.fr.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- distros/po/free-distros.fr.po       7 Feb 2020 09:02:30 -0000       1.193
+++ distros/po/free-distros.fr.po       17 Jul 2020 19:02:11 -0000      1.194
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-02-07 10:01+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -514,7 +515,14 @@
 msgstr "Circonstances du retrait"
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.hr-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.hr-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- distros/po/free-distros.hr-diff.html        26 Apr 2020 14:29:00 -0000      
1.52
+++ distros/po/free-distros.hr-diff.html        17 Jul 2020 19:02:11 -0000      
1.53
@@ -318,7 +318,7 @@
   &lt;/tr&gt;&lt;/thead&gt;
 
   &lt;tr class="odd"&gt;
-   &lt;td class="icon"&gt;&lt;a href="http://www.blagblagblag.org/"&gt;
+   &lt;td class="icon"&gt;&lt;a 
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/"&gt;
        &lt;img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU" 
/&gt;&lt;/a&gt;&lt;/td&gt;
    &lt;td&gt;BLAG Linux and GNU, a GNU/Linux distribution based on 
Fedora.&lt;/td&gt;
    &lt;td&gt;&lt;em&gt;Removed June 2018&lt;/em&gt;. Removed at the request of 
the
@@ -397,7 +397,7 @@
 
 <span class="inserted"><ins><em>&lt;p 
class="unprintable"&gt;Updated:</em></ins></span>
 &lt;!-- timestamp start --&gt;
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: distros/po/free-distros.hr.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.hr.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- distros/po/free-distros.hr.po       6 Feb 2020 16:00:36 -0000       1.56
+++ distros/po/free-distros.hr.po       17 Jul 2020 19:02:11 -0000      1.57
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2014-02-04 19:53+0100\n"
 "Last-Translator: Martina Bebek <martinaporec@gmail.com>\n"
 "Language-Team: GNU Croatian Translation Team <www-hr-lista@gnu.org>\n"
@@ -577,7 +577,14 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.it-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- distros/po/free-distros.it-diff.html        26 Apr 2020 14:29:00 -0000      
1.16
+++ distros/po/free-distros.it-diff.html        17 Jul 2020 19:02:11 -0000      
1.17
@@ -307,7 +307,7 @@
   &lt;/tr&gt;&lt;/thead&gt;
 
   &lt;tr class="odd"&gt;
-   &lt;td class="icon"&gt;&lt;a href="http://www.blagblagblag.org/"&gt;
+   &lt;td class="icon"&gt;&lt;a 
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/"&gt;
        &lt;img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU" 
/&gt;&lt;/a&gt;&lt;/td&gt;
    &lt;td&gt;BLAG Linux and GNU, a GNU/Linux distribution based on 
Fedora.&lt;/td&gt;
    &lt;td&gt;&lt;em&gt;Removed June 2018&lt;/em&gt;. Removed at the request of 
the
@@ -383,7 +383,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: distros/po/free-distros.it.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.it.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- distros/po/free-distros.it.po       6 Feb 2020 16:00:37 -0000       1.191
+++ distros/po/free-distros.it.po       17 Jul 2020 19:02:11 -0000      1.192
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2017-12-28 23:39+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian\n"
@@ -634,7 +634,14 @@
 
 # type: Content of: <table><tr><td><a>
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.ja.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ja.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- distros/po/free-distros.ja.po       29 Feb 2020 09:03:44 -0000      1.127
+++ distros/po/free-distros.ja.po       17 Jul 2020 19:02:11 -0000      1.128
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-02-29 17:57+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -495,7 +496,11 @@
 msgstr "引退情報"
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.nl-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.nl-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- distros/po/free-distros.nl-diff.html        26 Apr 2020 14:29:00 -0000      
1.22
+++ distros/po/free-distros.nl-diff.html        17 Jul 2020 19:02:11 -0000      
1.23
@@ -294,7 +294,7 @@
   &lt;/tr&gt;&lt;/thead&gt;
 
   &lt;tr class="odd"&gt;
-   &lt;td class="icon"&gt;&lt;a href="http://www.blagblagblag.org/"&gt;
+   &lt;td class="icon"&gt;&lt;a 
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/"&gt;
        &lt;img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU" 
/&gt;&lt;/a&gt;&lt;/td&gt;
    &lt;td&gt;BLAG Linux and GNU, a GNU/Linux distribution based on 
Fedora.&lt;/td&gt;
    &lt;td&gt;&lt;em&gt;Removed June 2018&lt;/em&gt;. Removed at the request of 
the
@@ -370,7 +370,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: distros/po/free-distros.nl.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.nl.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- distros/po/free-distros.nl.po       6 Feb 2020 16:00:37 -0000       1.36
+++ distros/po/free-distros.nl.po       17 Jul 2020 19:02:11 -0000      1.37
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-07-30 22:18+0200\n"
 "Last-Translator: Tom Uijldert <tom.uijldert@gmail.com>\n"
 "Language-Team: Dutch\n"
@@ -507,7 +507,14 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.pl-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.pl-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- distros/po/free-distros.pl-diff.html        26 Apr 2020 14:29:00 -0000      
1.29
+++ distros/po/free-distros.pl-diff.html        17 Jul 2020 19:02:11 -0000      
1.30
@@ -307,7 +307,7 @@
   &lt;/tr&gt;&lt;/thead&gt;
 
   &lt;tr class="odd"&gt;
-   &lt;td class="icon"&gt;&lt;a href="http://www.blagblagblag.org/"&gt;
+   &lt;td class="icon"&gt;&lt;a 
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/"&gt;
        &lt;img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU" 
/&gt;&lt;/a&gt;&lt;/td&gt;
    &lt;td&gt;BLAG Linux and GNU, a GNU/Linux distribution based on 
Fedora.&lt;/td&gt;
    &lt;td&gt;&lt;em&gt;Removed June 2018&lt;/em&gt;. Removed at the request of 
the
@@ -383,7 +383,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: distros/po/free-distros.pl.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.pl.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- distros/po/free-distros.pl.po       6 Feb 2020 16:00:37 -0000       1.141
+++ distros/po/free-distros.pl.po       17 Jul 2020 19:02:11 -0000      1.142
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2015-07-17 21:35-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -582,7 +582,14 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.pot
===================================================================
RCS file: /web/www/www/distros/po/free-distros.pot,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- distros/po/free-distros.pot 6 Feb 2020 16:00:37 -0000       1.99
+++ distros/po/free-distros.pot 17 Jul 2020 19:02:11 -0000      1.100
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -396,7 +396,9 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a "
+"href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/\";>"
 msgstr ""
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.pt-br.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.pt-br.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- distros/po/free-distros.pt-br.po    22 May 2020 22:05:05 -0000      1.114
+++ distros/po/free-distros.pt-br.po    17 Jul 2020 19:02:11 -0000      1.115
@@ -11,7 +11,7 @@
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-02-06 21:14-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -19,6 +19,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -506,7 +507,11 @@
 msgstr "Circunstâncias de retirada"
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.ro-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ro-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- distros/po/free-distros.ro-diff.html        26 Apr 2020 14:29:00 -0000      
1.60
+++ distros/po/free-distros.ro-diff.html        17 Jul 2020 19:02:11 -0000      
1.61
@@ -318,7 +318,7 @@
   &lt;/tr&gt;&lt;/thead&gt;
 
   &lt;tr class="odd"&gt;
-   &lt;td class="icon"&gt;&lt;a href="http://www.blagblagblag.org/"&gt;
+   &lt;td class="icon"&gt;&lt;a 
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/"&gt;
        &lt;img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU" 
/&gt;&lt;/a&gt;&lt;/td&gt;
    &lt;td&gt;BLAG Linux and GNU, a GNU/Linux distribution based on 
Fedora.&lt;/td&gt;
    &lt;td&gt;&lt;em&gt;Removed June 2018&lt;/em&gt;. Removed at the request of 
the
@@ -397,7 +397,7 @@
 
 <span class="inserted"><ins><em>&lt;p 
class="unprintable"&gt;Updated:</em></ins></span>
 &lt;!-- timestamp start --&gt;
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: distros/po/free-distros.ro.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ro.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- distros/po/free-distros.ro.po       6 Feb 2020 16:00:37 -0000       1.63
+++ distros/po/free-distros.ro.po       17 Jul 2020 19:02:11 -0000      1.64
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2013-12-11 13:41+0200\n"
 "Last-Translator: Tiberiu C. Turbureanu <tct@ceata.org>\n"
 "Language-Team: Romanian <ceata-traduceri@liste.ceata.org>\n"
@@ -612,7 +612,14 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.ru.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ru.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- distros/po/free-distros.ru.po       6 Feb 2020 17:35:00 -0000       1.205
+++ distros/po/free-distros.ru.po       17 Jul 2020 19:02:11 -0000      1.206
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-05-11 17:17+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 # type: Content of: <title>
 #. type: Content of: <title>
@@ -516,7 +517,14 @@
 msgstr "Сведения о списании"
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.sk.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.sk.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- distros/po/free-distros.sk.po       6 Feb 2020 16:00:37 -0000       1.104
+++ distros/po/free-distros.sk.po       17 Jul 2020 19:02:11 -0000      1.105
@@ -9,7 +9,7 @@
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2009-09-27 22:36+0200\n"
 "Last-Translator: Dominik Smatana <dominik@fsf.sk>\n"
 "Language-Team: Slovak <sk-i18n@linux.sk>\n"
@@ -548,7 +548,14 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.tr.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.tr.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- distros/po/free-distros.tr.po       5 Mar 2020 17:49:23 -0000       1.11
+++ distros/po/free-distros.tr.po       17 Jul 2020 19:02:11 -0000      1.12
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-02-07 19:46+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.4\n"
 
@@ -496,7 +497,11 @@
 msgstr "Çekilme Bilgisi"
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.uk-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.uk-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- distros/po/free-distros.uk-diff.html        26 Apr 2020 14:29:00 -0000      
1.18
+++ distros/po/free-distros.uk-diff.html        17 Jul 2020 19:02:11 -0000      
1.19
@@ -307,7 +307,7 @@
   &lt;/tr&gt;&lt;/thead&gt;
 
   &lt;tr class="odd"&gt;
-   &lt;td class="icon"&gt;&lt;a href="http://www.blagblagblag.org/"&gt;
+   &lt;td class="icon"&gt;&lt;a 
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/"&gt;
        &lt;img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU" 
/&gt;&lt;/a&gt;&lt;/td&gt;
    &lt;td&gt;BLAG Linux and GNU, a GNU/Linux distribution based on 
Fedora.&lt;/td&gt;
    &lt;td&gt;&lt;em&gt;Removed June 2018&lt;/em&gt;. Removed at the request of 
the
@@ -383,7 +383,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: distros/po/free-distros.uk.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.uk.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- distros/po/free-distros.uk.po       6 Feb 2020 16:00:37 -0000       1.92
+++ distros/po/free-distros.uk.po       17 Jul 2020 19:02:11 -0000      1.93
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2018-01-01 07:31+0200\n"
 "Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
 "Language-Team: Ukrainian <>\n"
@@ -556,7 +556,11 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.zh-cn.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.zh-cn.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- distros/po/free-distros.zh-cn.po    8 Feb 2020 06:30:00 -0000       1.35
+++ distros/po/free-distros.zh-cn.po    17 Jul 2020 19:02:11 -0000      1.36
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-02-07 21:06+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -451,7 +452,11 @@
 msgstr "退出信息"
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: distros/po/free-distros.zh-tw.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.zh-tw.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- distros/po/free-distros.zh-tw.po    8 Feb 2020 09:59:58 -0000       1.17
+++ distros/po/free-distros.zh-tw.po    17 Jul 2020 19:02:11 -0000      1.18
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:16+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: \n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "X-Generator: Poedit 2.2.4\n"
 "Plural-Forms: nplurals=1; plural=0;\n"
 
@@ -460,7 +461,14 @@
 msgstr "退出消息"
 
 #. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\";>"
+# | <a [-href=\"http://www.blagblagblag.org/\";>-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\";>"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">"
 msgstr "<a href=\"http://www.blagblagblag.org/\";>"
 
 #. type: Attribute 'alt' of: <table><tr><td><a><img>

Index: fry/po/happy-birthday-to-gnu.ar.po
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.ar.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- fry/po/happy-birthday-to-gnu.ar.po  8 Jan 2019 15:00:34 -0000       1.35
+++ fry/po/happy-birthday-to-gnu.ar.po  17 Jul 2020 19:02:13 -0000      1.36
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: happy-birthday-to-gnu.html\n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2009-09-02 21:46+0200\n"
 "Last-Translator: Hossam Hossny <hossam@gnu.org>\n"
 "Language-Team: Arabic\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "X-Generator: Lokalize 1.0\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -346,9 +347,17 @@
 "على دبيان و أوبونتو، بدعم من 
إف&#8203;إس&#8203;إف."
 
 #. type: Content of: <table><tr><td><ul><li>
-msgid ""
-"<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a GNU/"
-"Linux distribution based on Fedora."
+# | <a [-href=\"http://www.blagblagblag.org/\";>BLAG</a>,-]
+# | 
{+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/\";>BLAG</a>,+}
+# | BLAG Linux and GNU, a GNU/Linux distribution based on Fedora.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a "
+#| "GNU/Linux distribution based on Fedora."
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">BLAG</a>, BLAG Linux and GNU, a GNU/Linux distribution based on "
+"Fedora."
 msgstr ""
 "<a href=\"http://www.blagblagblag.org/\";>BLAG</a> -توزيعة لينكس 
وغنو BLAG-"
 "توزيعة غنو/لينكس مبنية على فيدورا."
@@ -405,7 +414,13 @@
 "href=\"/server/standards/README.translations.html\">دليل الترجم
Ø©</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright &copy; 2008, 2014, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2008, 2014, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2008, 2014, 2018, 2019 مؤسسة البرمجيات 
الحرة، المحدودة."
 

Index: fry/po/happy-birthday-to-gnu.de.po
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.de.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- fry/po/happy-birthday-to-gnu.de.po  30 Jan 2019 13:00:25 -0000      1.65
+++ fry/po/happy-birthday-to-gnu.de.po  17 Jul 2020 19:02:13 -0000      1.66
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: happy-birthday-to-gnu.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-01-19 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -351,9 +352,17 @@
 "Ubuntu basierende GNU/Linux-Verteilung, mit Unterstützung der FSF."
 
 #. type: Content of: <table><tr><td><ul><li>
-msgid ""
-"<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a GNU/"
-"Linux distribution based on Fedora."
+# | <a [-href=\"http://www.blagblagblag.org/\";>BLAG</a>,-]
+# | 
{+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/\";>BLAG</a>,+}
+# | BLAG Linux and GNU, a GNU/Linux distribution based on Fedora.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a "
+#| "GNU/Linux distribution based on Fedora."
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">BLAG</a>, BLAG Linux and GNU, a GNU/Linux distribution based on "
+"Fedora."
 msgstr ""
 "<b><a href=\"//blagblagblag.org/\">BLAG</a></b>, eine auf Fedora basierende "
 "GNU/Linux-Verteilung "
@@ -414,7 +423,13 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright &copy; 2008, 2014, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2008, 2014, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: fry/po/happy-birthday-to-gnu.fr.po
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.fr.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- fry/po/happy-birthday-to-gnu.fr.po  15 Sep 2019 12:48:10 -0000      1.38
+++ fry/po/happy-birthday-to-gnu.fr.po  17 Jul 2020 19:02:13 -0000      1.39
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: happy-birthday-to-gnu.html\n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-01-05 19:21+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms:  \n"
 
 #. type: Content of: <title>
@@ -357,9 +358,17 @@
 "Linux basée sur Debian et Ubuntu, avec le soutien de la FSF."
 
 #. type: Content of: <table><tr><td><ul><li>
-msgid ""
-"<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a GNU/"
-"Linux distribution based on Fedora."
+# | <a [-href=\"http://www.blagblagblag.org/\";>BLAG</a>,-]
+# | 
{+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/\";>BLAG</a>,+}
+# | BLAG Linux and GNU, a GNU/Linux distribution based on Fedora.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a "
+#| "GNU/Linux distribution based on Fedora."
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">BLAG</a>, BLAG Linux and GNU, a GNU/Linux distribution based on "
+"Fedora."
 msgstr ""
 "<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux et GNU, une "
 "distribution GNU/Linux basée sur Fedora."
@@ -418,7 +427,13 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright &copy; 2008, 2014, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2008, 2014, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: fry/po/happy-birthday-to-gnu.pot
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.pot,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- fry/po/happy-birthday-to-gnu.pot    5 Jan 2019 17:59:50 -0000       1.22
+++ fry/po/happy-birthday-to-gnu.pot    17 Jul 2020 19:02:13 -0000      1.23
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: happy-birthday-to-gnu.html\n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -265,8 +265,9 @@
 
 #. type: Content of: <table><tr><td><ul><li>
 msgid ""
-"<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a "
-"GNU/Linux distribution based on Fedora."
+"<a "
+"href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/\";>BLAG</a>,
 "
+"BLAG Linux and GNU, a GNU/Linux distribution based on Fedora."
 msgstr ""
 
 #. type: Content of: <table><tr><td><p>
@@ -312,7 +313,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2008, 2014, 2018, 2019, 2020 Free Software Foundation, 
Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: fry/po/happy-birthday-to-gnu.pt-br.po
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.pt-br.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- fry/po/happy-birthday-to-gnu.pt-br.po       27 May 2020 14:59:07 -0000      
1.5
+++ fry/po/happy-birthday-to-gnu.pt-br.po       17 Jul 2020 19:02:13 -0000      
1.6
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: happy-birthday-to-gnu.html\n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-01-12 21:05-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -357,9 +358,14 @@
 "Linux baseada no Debian e Ubuntu, com patrocínio da FSF."
 
 #. type: Content of: <table><tr><td><ul><li>
-msgid ""
-"<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a GNU/"
-"Linux distribution based on Fedora."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a "
+#| "GNU/Linux distribution based on Fedora."
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">BLAG</a>, BLAG Linux and GNU, a GNU/Linux distribution based on "
+"Fedora."
 msgstr ""
 "<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux e GNU, uma "
 "distribuição GNU/Linux baseada no Fedora."
@@ -417,7 +423,11 @@
 "envio de traduções das páginas deste site."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2008, 2014, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: fry/po/happy-birthday-to-gnu.sq.po
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.sq.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- fry/po/happy-birthday-to-gnu.sq.po  9 Feb 2019 17:59:55 -0000       1.44
+++ fry/po/happy-birthday-to-gnu.sq.po  17 Jul 2020 19:02:13 -0000      1.45
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: \n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-02-09 19:15+0200\n"
 "Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
 "Language-Team: \n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "X-Generator: Poedit 2.2\n"
 
 # type: Content of: <table><tr><td><p>
@@ -391,9 +392,14 @@
 
 # type: Content of: <table><tr><td><ul><li>
 #. type: Content of: <table><tr><td><ul><li>
-msgid ""
-"<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a GNU/"
-"Linux distribution based on Fedora."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux and GNU, a "
+#| "GNU/Linux distribution based on Fedora."
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.";
+"org/\">BLAG</a>, BLAG Linux and GNU, a GNU/Linux distribution based on "
+"Fedora."
 msgstr ""
 "<a href=\"http://www.blagblagblag.org/\";>BLAG</a>, BLAG Linux dhe GNU, një "
 "shpërndarje GNU/Linux e bazuar në Fedora."
@@ -454,7 +460,11 @@
 "standards/README.translations.html\">README për përkthimet</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2008, 2014, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr ""
 "Të drejta kopjimi &copy; 2008, 2014, 2018, 2019 Free Software Foundation, "
 "Inc."

Index: philosophy/po/microsoft-new-monopoly.ca.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.ca.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/po/microsoft-new-monopoly.ca.po  17 Sep 2016 08:58:45 -0000      
1.29
+++ philosophy/po/microsoft-new-monopoly.ca.po  17 Jul 2020 19:02:13 -0000      
1.30
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: microsoft-new-monopoly.ca\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2016-05-02 11:58+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2016-09-17 10:02+0200\n"
 "Last-Translator: Miquel Puigpelat <mpuigpe1@xtec.cat>\n"
 "Language-Team: Catalan <www-ca-traductors@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 # type: Content of: <title>
 #. type: Content of: <title>
@@ -139,13 +140,30 @@
 
 # type: Content of: <p>
 #. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";>
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx</a>."
 msgid ""
 "The next version of Microsoft Word will use formats that involve a technique "
 "that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
 "patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";> https://";
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/";
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
 msgstr ""
 "La pròxima versió de Microsoft Word utilitzarà formats que impliquen una "
 "tècnica sobre la qual Microsoft afirma tenir una patent. Microsoft n'ofereix 
"
@@ -361,7 +379,10 @@
 "traducció al català del web de GNU."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright &copy; 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright &copy; 2005, 2009, 2015, 2016, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/microsoft-new-monopoly.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.es.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- philosophy/po/microsoft-new-monopoly.es.po  15 Sep 2019 21:06:05 -0000      
1.13
+++ philosophy/po/microsoft-new-monopoly.es.po  17 Jul 2020 19:02:13 -0000      
1.14
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-11-18 06:59+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2016-05-03 12:24+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.6.10\n"
 
@@ -134,13 +135,30 @@
 "archivos de Word. Pero Microsoft no ha sido derrotado aún."
 
 #. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";>
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx</a>."
 msgid ""
 "The next version of Microsoft Word will use formats that involve a technique "
 "that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
 "patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";> https://";
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/";
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
 msgstr ""
 "La próxima versión de Microsoft Word utilizará formatos que incluyen una "
 "técnica de la cual Microsoft afirma poseer la patente. Microsoft ofrece una "
@@ -351,7 +369,10 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright &copy; 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright &copy; 2005, 2009, 2015, 2016, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/microsoft-new-monopoly.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.fr.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- philosophy/po/microsoft-new-monopoly.fr.po  3 Nov 2018 21:44:35 -0000       
1.43
+++ philosophy/po/microsoft-new-monopoly.fr.po  17 Jul 2020 19:02:13 -0000      
1.44
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-05-02 11:58+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2018-11-03 22:24+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms:  \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -133,13 +134,30 @@
 "fichiers Word. Mais Microsoft n'a pas dit son dernier mot."
 
 #. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";>
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx</a>."
 msgid ""
 "The next version of Microsoft Word will use formats that involve a technique "
 "that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
 "patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";> https://";
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/";
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
 msgstr ""
 "La prochaine version de Microsoft Word utilisera des formats qui mettent en "
 "œuvre une technique sur laquelle Microsoft prétend détenir un brevet. "
@@ -350,7 +368,10 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright &copy; 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright &copy; 2005, 2009, 2015, 2016, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/microsoft-new-monopoly.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.nl.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- philosophy/po/microsoft-new-monopoly.nl.po  22 May 2017 07:36:03 -0000      
1.11
+++ philosophy/po/microsoft-new-monopoly.nl.po  17 Jul 2020 19:02:13 -0000      
1.12
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-11-18 06:59+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Tom Uijldert <tom.uijldert@gmail.com>\n"
 "Language-Team: Dutch\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Microsoft's New Monopoly - GNU Project - Free Software Foundation"
@@ -126,13 +127,30 @@
 "verslagen."
 
 #. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";>
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx</a>."
 msgid ""
 "The next version of Microsoft Word will use formats that involve a technique "
 "that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
 "patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";> https://";
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/";
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
 msgstr ""
 "De volgende versie van Microsoft Word zal formaten gebruiken waarvan "
 "Microsoft beweert dat er patenten op rusten. Microsoft biedt verder een "
@@ -339,7 +357,10 @@
 "voor informatie over het onderhoud van vertalingen op deze website."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright &copy; 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright &copy; 2005, 2009, 2015, 2016, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/microsoft-new-monopoly.pl.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.pl.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- philosophy/po/microsoft-new-monopoly.pl.po  22 Apr 2017 13:00:43 -0000      
1.20
+++ philosophy/po/microsoft-new-monopoly.pl.po  17 Jul 2020 19:02:13 -0000      
1.21
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-11-18 06:59+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2015-10-31 20:34-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=3; plural=(n==1 ? 0 : n%10>=2 && n%10<=4 && (n%100<10 "
 "|| n%100>=20) ? 1 : 2);\n"
 "X-Generator: Virtaal 0.7.1\n"
@@ -132,13 +133,30 @@
 "Microsoft jeszcze nie został pokonany."
 
 #. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";>
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx</a>."
 msgid ""
 "The next version of Microsoft Word will use formats that involve a technique "
 "that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
 "patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";> https://";
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/";
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
 msgstr ""
 "Następna wersja programu Microsoft Word będzie stosować formaty plików, "
 "wykorzystujące technikę opatentowaną przez Microsoft. Microsoft oferuje "
@@ -360,7 +378,10 @@
 "tłumaczeń</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright &copy; 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright &copy; 2005, 2009, 2015, 2016, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/microsoft-new-monopoly.pot
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- philosophy/po/microsoft-new-monopoly.pot    18 Nov 2016 07:32:59 -0000      
1.17
+++ philosophy/po/microsoft-new-monopoly.pot    17 Jul 2020 19:02:13 -0000      
1.18
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-11-18 06:59+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -94,9 +94,9 @@
 "The next version of Microsoft Word will use formats that involve a technique "
 "that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
 "patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a "
-"href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";> "
-"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a "
+"href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
 "
+"the license</a>."
 msgstr ""
 
 #. type: Content of: <p>
@@ -225,7 +225,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright &copy; 2005, 2009, 2015, 2016, 2020 Richard Stallman"
 msgstr ""
 
 #. type: Content of: <div><p>

Index: philosophy/po/microsoft-new-monopoly.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.ru.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- philosophy/po/microsoft-new-monopoly.ru.po  2 May 2016 16:33:37 -0000       
1.12
+++ philosophy/po/microsoft-new-monopoly.ru.po  17 Jul 2020 19:02:13 -0000      
1.13
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-05-02 11:58+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2016-05-02 17:34+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Microsoft's New Monopoly - GNU Project - Free Software Foundation"
@@ -134,13 +135,30 @@
 "файлов Word. Но&nbsp;компанию Microsoft еще 
не&nbsp;обыграли."
 
 #. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";>
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/";
+#| "gg463420.aspx</a>."
 msgid ""
 "The next version of Microsoft Word will use formats that involve a technique "
 "that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
 "patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\";> https://";
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/";
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
 msgstr ""
 "В следующей версии Microsoft Word будут 
применяться форматы, которые "
 "привлекают технику, на&nbsp;которую, 
по&nbsp;заявлению Microsoft, у&nbsp;нее "
@@ -360,7 +378,10 @@
 
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright &copy; 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright &copy; 2005, 2009, 2015, 2016, 2020 Richard Stallman"
 msgstr ""
 "Copyright &copy; 2005, 2009, 2015, 2016 Richard Stallman<br />Copyright "
 "&copy; 2015, 2016 Free Software Foundation, Inc. (translation)"

Index: philosophy/po/surveillance-vs-democracy.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.es.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- philosophy/po/surveillance-vs-democracy.es.po       15 Jan 2020 12:36:19 
-0000      1.104
+++ philosophy/po/surveillance-vs-democracy.es.po       17 Jul 2020 19:02:13 
-0000      1.105
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-10-06 12:22+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -1105,16 +1106,38 @@
 "Estadounidense por las Libertades Civiles está a favor de esto."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# | 
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations-]
+# | 
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations+}
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Las corporaciones no son personas, y no tienen derechos "
@@ -1245,7 +1268,11 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Richard
+# | Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.fr.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- philosophy/po/surveillance-vs-democracy.fr.po       5 Oct 2019 11:10:12 
-0000       1.121
+++ philosophy/po/surveillance-vs-democracy.fr.po       17 Jul 2020 19:02:13 
-0000      1.122
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-10-05 13:02+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -1112,16 +1113,38 @@
 "la force diminuer de près de 60 %</a>. L'ACLU y est favorable."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# | 
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations-]
+# | 
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations+}
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Les entreprises ne sont pas des personnes et ne peuvent "
@@ -1275,7 +1298,11 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Richard
+# | Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.it-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- philosophy/po/surveillance-vs-democracy.it-diff.html        30 Dec 2019 
12:08:33 -0000      1.9
+++ philosophy/po/surveillance-vs-democracy.it-diff.html        17 Jul 2020 
19:02:13 -0000      1.10
@@ -532,7 +532,8 @@
 use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
+<span 
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</em></ins></span>
 are not people, and not entitled to human rights&lt;/a&gt;.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
@@ -626,7 +627,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017, 2018, <span 
class="removed"><del><strong>2019</strong></del></span> <span 
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -636,7 +637,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/30 12:08:33 $
+$Date: 2020/07/17 19:02:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- philosophy/po/surveillance-vs-democracy.it.po       5 Oct 2019 09:31:02 
-0000       1.117
+++ philosophy/po/surveillance-vs-democracy.it.po       17 Jul 2020 19:02:13 
-0000      1.118
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-04-18 22:23+0200\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian\n"
@@ -1131,16 +1131,38 @@
 "a>). L’ACLU è favorevole a questo provvedimento."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# | 
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations-]
+# | 
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations+}
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "Le imprese non sono persone, e <a href=\"http://action.citizen.org/p/dia/";
 "action3/common/public/?action_KEY=12266\">non godono di diritti umani</a>. È 
"
@@ -1265,7 +1287,11 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Richard
+# | Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ja.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- philosophy/po/surveillance-vs-democracy.ja.po       30 Apr 2020 19:04:01 
-0000      1.64
+++ philosophy/po/surveillance-vs-democracy.ja.po       17 Jul 2020 19:02:13 
-0000      1.65
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-04-30 22:08+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -1005,16 +1006,27 @@
 
"使用が60%降下したそうです</a>。ACLUはこれを好ましく考えています。"
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">企業は人々ではなく、人権の資æ 
¼ã¯ã‚りません</a>。化学的、生"
@@ -1132,7 +1144,9 @@
 "README.translations.html\">翻訳 README</a>をご覧ください。"
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- philosophy/po/surveillance-vs-democracy.lt-diff.html        30 Dec 2019 
12:08:33 -0000      1.35
+++ philosophy/po/surveillance-vs-democracy.lt-diff.html        17 Jul 2020 
19:02:13 -0000      1.36
@@ -565,7 +565,8 @@
 use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
+<span 
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</em></ins></span>
 are not people, and not entitled to human rights&lt;/a&gt;.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
@@ -661,7 +662,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019</em></ins></span> 
Richard Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020</em></ins></span> 
Richard Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -671,7 +672,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/30 12:08:33 $
+$Date: 2020/07/17 19:02:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/surveillance-vs-democracy.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- philosophy/po/surveillance-vs-democracy.lt.po       5 Oct 2019 09:31:02 
-0000       1.36
+++ philosophy/po/surveillance-vs-democracy.lt.po       17 Jul 2020 19:02:13 
-0000      1.37
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2015-12-16 13:11+0100\n"
 "Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
 "Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -1324,16 +1324,38 @@
 "60&nbsp;%</a>.  ACLU šitam teikia pirmenybę."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# | 
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations-]
+# | 
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations+}
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Korporacijos nėra žmonės ir žmogaus teisės 
netaikytinos</"
@@ -1464,10 +1486,11 @@
 "PERSKAITYKITEMANE</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015-] {+2015, 2016, 2017, 2018, 2019+} Richard Stallman
+# | Copyright &copy; [-2015-] {+2015, 2016, 2017, 2018, 2019, 2020+} Richard
+# | Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2015 Richard Stallman"
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.ml-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ml-diff.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/surveillance-vs-democracy.ml-diff.html        3 May 2020 
17:32:45 -0000       1.3
+++ philosophy/po/surveillance-vs-democracy.ml-diff.html        17 Jul 2020 
19:02:13 -0000      1.4
@@ -532,7 +532,8 @@
 use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
+<span 
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</em></ins></span>
 are not people, and not entitled to human rights&lt;/a&gt;.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
@@ -626,7 +627,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017, 2018, <span 
class="removed"><del><strong>2019</strong></del></span> <span 
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -636,7 +637,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/05/03 17:32:45 $
+$Date: 2020/07/17 19:02:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/surveillance-vs-democracy.ml.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ml.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/surveillance-vs-democracy.ml.po       3 May 2020 17:32:45 
-0000       1.6
+++ philosophy/po/surveillance-vs-democracy.ml.po       17 Jul 2020 19:02:13 
-0000      1.7
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-07-12 23:15+0200\n"
 "Last-Translator: Aiswarya Kaitheri Kandoth <aiswaryakk29@gmail.com>\n"
 "Language-Team: Malayalam <>\n"
@@ -1092,16 +1092,38 @@
 "ഇതിനു് അനുകൂലമാണു്."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# | 
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations-]
+# | 
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations+}
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">കോർപ്പറേഷനുകൾ 
ജനങ്ങളല്ല, അതു് 
മനുഷ്യാവകാശങ്ങൾ അ
ർഹിക്കുന്നില്ല</a>. "
@@ -1233,7 +1255,11 @@
 "README.translations.html\">Translations README</a> നോക്കുക."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Richard
+# | Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- philosophy/po/surveillance-vs-democracy.nl-diff.html        30 Dec 2019 
12:08:33 -0000      1.25
+++ philosophy/po/surveillance-vs-democracy.nl-diff.html        17 Jul 2020 
19:02:13 -0000      1.26
@@ -536,7 +536,8 @@
 use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
+<span 
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</em></ins></span>
 are not people, and not entitled to human rights&lt;/a&gt;.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
@@ -630,7 +631,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -640,7 +641,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/30 12:08:33 $
+$Date: 2020/07/17 19:02:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/surveillance-vs-democracy.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- philosophy/po/surveillance-vs-democracy.nl.po       5 Oct 2019 09:31:02 
-0000       1.42
+++ philosophy/po/surveillance-vs-democracy.nl.po       17 Jul 2020 19:02:13 
-0000      1.43
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:13+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -1184,16 +1184,38 @@
 "is hier voorstander van."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# | 
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations-]
+# | 
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations+}
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Bedrijven zijn geen mensen, en kunnen geen aanspraak "
@@ -1319,10 +1341,11 @@
 "voor informatie over het onderhoud van vertalingen op deze website."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2015, 2016, [-2017-] {+2017, 2018, 2019+} Richard Stallman
+# | Copyright &copy; 2015, 2016, [-2017-] {+2017, 2018, 2019, 2020+} Richard
+# | Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2015, 2016, 2017 Richard Stallman"
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.pot
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pot,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- philosophy/po/surveillance-vs-democracy.pot 5 Oct 2019 09:31:02 -0000       
1.50
+++ philosophy/po/surveillance-vs-democracy.pot 17 Jul 2020 19:02:13 -0000      
1.51
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -670,7 +670,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "<a "
-"href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations
 "
+"href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations
 "
 "are not people, and not entitled to human rights</a>.  It is legitimate to "
 "require businesses to publish the details of processes that might cause "
 "chemical, biological, nuclear, fiscal, computational (e.g., <a "
@@ -762,7 +762,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr ""
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pt-br.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- philosophy/po/surveillance-vs-democracy.pt-br.po    22 May 2020 22:05:26 
-0000      1.57
+++ philosophy/po/surveillance-vs-democracy.pt-br.po    17 Jul 2020 19:02:13 
-0000      1.58
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-10-12 07:07-0200\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -1066,16 +1067,27 @@
 "a>;. A ACLU concorda com isto."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Empresas não são pessoas, e a elas não se aplicam 
diretos "
@@ -1254,7 +1266,9 @@
 "envio de traduções das páginas deste site."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- philosophy/po/surveillance-vs-democracy.ru.po       6 Oct 2019 04:29:16 
-0000       1.111
+++ philosophy/po/surveillance-vs-democracy.ru.po       17 Jul 2020 19:02:13 
-0000      1.112
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-06-26 09:27+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -1066,16 +1067,38 @@
 "поддерживает это."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# | 
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations-]
+# | 
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations+}
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\"> Корпорации&nbsp;&mdash; не люди, у них
 не должно быть "
@@ -1202,7 +1225,11 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+# | Copyright &copy; 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Richard
+# | Stallman
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr ""
 "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman<br /"
 ">Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, "

Index: philosophy/po/surveillance-vs-democracy.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.sq.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- philosophy/po/surveillance-vs-democracy.sq.po       1 Dec 2019 10:29:59 
-0000       1.97
+++ philosophy/po/surveillance-vs-democracy.sq.po       17 Jul 2020 19:02:14 
-0000      1.98
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
 "Language-Team: \n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "X-Generator: Poedit 2.2\n"
 
 #. type: Content of: <title>
@@ -1076,16 +1077,27 @@
 "ACLU është në favor të kësaj."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Korporatat nuk janë njerëz, ndaj as subjekt i të 
drejtave "
@@ -1212,7 +1224,9 @@
 "standards/README.translations.html\">README për përkthimet</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Të drejta kopjimi &copy; 2015, 2016, 2017, 2018, 2019 Richard 
Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.tr.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/surveillance-vs-democracy.tr.po       5 Mar 2020 17:49:24 
-0000       1.5
+++ philosophy/po/surveillance-vs-democracy.tr.po       17 Jul 2020 19:02:14 
-0000      1.6
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-01-18 20:11+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "X-Generator: Poedit 2.2.4\n"
 
 #. type: Content of: <title>
@@ -1042,16 +1043,27 @@
 "\">güç kullanımlarının %60 oranında düştüğü</a> bulundu. ACLU 
bundan yana."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Şirketler insan değildir ve insan haklarına sahip "
@@ -1175,7 +1187,9 @@
 "\">çalışma&nbsp;sayfamızı</a> ziyaret edebilirsiniz."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- philosophy/po/surveillance-vs-democracy.uk-diff.html        30 Dec 2019 
12:08:33 -0000      1.16
+++ philosophy/po/surveillance-vs-democracy.uk-diff.html        17 Jul 2020 
19:02:14 -0000      1.17
@@ -532,7 +532,8 @@
 use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
+<span 
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</em></ins></span>
 are not people, and not entitled to human rights&lt;/a&gt;.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
@@ -626,7 +627,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -636,7 +637,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/30 12:08:33 $
+$Date: 2020/07/17 19:02:14 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/surveillance-vs-democracy.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- philosophy/po/surveillance-vs-democracy.uk.po       5 Oct 2019 09:31:02 
-0000       1.77
+++ philosophy/po/surveillance-vs-democracy.uk.po       17 Jul 2020 19:02:14 
-0000      1.78
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2018-05-23 21:01+0200\n"
 "Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
 "Language-Team: Ukrainian <>\n"
@@ -1159,16 +1159,27 @@
 "скоротилося на 60%</a>. ACLU підтримує це."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\"> Корпорації&nbsp;&mdash; не люди, у них
 не повинно бути "
@@ -1295,7 +1306,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2015, 2016, 2017, 2018 Richard Stallman"
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017, 2018 Річард Столмен"
 
 #. type: Content of: <div><p>

Index: philosophy/po/surveillance-vs-democracy.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.zh-cn.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- philosophy/po/surveillance-vs-democracy.zh-cn.po    6 Oct 2019 08:28:38 
-0000       1.47
+++ philosophy/po/surveillance-vs-democracy.zh-cn.po    17 Jul 2020 19:02:14 
-0000      1.48
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2019-10-06 16:12+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -910,16 +911,27 @@
 "由联盟)很支持这个做法。"
 
 #. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>.  It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\";>DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being.  The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>.  It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org";
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being.  The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>.  It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being.  The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">企业不是人,它们没有人权</a>。要求商业å…
¬å¸å…¬å¼€å…¶å¯èƒ½å¯¹ç¤¾ä¼š"
@@ -1047,7 +1059,9 @@
 "翻译须知</a>获取有关协调和提交翻译的相关事项。"
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary/po/de.po        13 Jul 2020 10:02:36 -0000      1.196
+++ proprietary/po/de.po        17 Jul 2020 19:02:14 -0000      1.197
@@ -8280,8 +8280,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 
@@ -12747,6 +12747,39 @@
 "Tastaturtreiber mit Keylogger</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | The <a
+# | 
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>
+# | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# | 
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+#| "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+#| "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet.";
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
+msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+"<a href=\"https://docs.microsoft.com/de-de/windows/privacy/configure-windows-";
+"diagnostic-data-in-your-organization#stufe-vollständig\">Telemetrie-Stufe "
+"„Vollständig“</a> ermöglicht Microsoft Windows-Ingenieuren unter 
anderem "
+"Zugriff auf Registrierungsschlüssel, <a 
href=\"https://technet.microsoft.com/";
+"de-de/library/cc939702.aspx\">die vertrauliche Informationen wie das "
+"Administrator-Anmeldekennwort enthalten können</a>."
+
+#. type: Content of: <div><div><ul><li><p>
 # | <a
 # | 
[-href=\"http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping\";>-]
 # | 
{+href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping\";>+}

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- proprietary/po/es.po        13 Jul 2020 10:02:36 -0000      1.282
+++ proprietary/po/es.po        17 Jul 2020 19:02:14 -0000      1.283
@@ -7815,11 +7815,25 @@
 "tiempo completo."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "La mayoría de las aplicaciones son <cite>malware</cite>, pero la aplicación 
"
@@ -12505,6 +12519,39 @@
 "contiene un registrador de teclas</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | The <a
+# | 
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>
+# | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# | 
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+#| "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+#| "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet.";
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
+msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+"El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\">nivel de "
+"telemetría «Completo»</a> permite a los ingenieros de Microsoft acceder, "
+"entre otras cosas, a claves de registro <a href=\"https://technet.microsoft.";
+"com/en-us/library/cc939702.aspx\">que contienen información sensible, como "
+"la contraseña de inicio de sesión del administrador</a>."
+
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
@@ -13425,6 +13472,21 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "La mayoría de las aplicaciones son <cite>malware</cite>, pero la "
+#~ "aplicación de la campaña de Trump, al igual que la de Modi<a href="
+#~ "\"#TransNote1\" id=\"TransNote1-rev\"><sup>[1]</sup></a>, es <a href="
+#~ "\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-";
+#~ "invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+#~ "\">particularmente nociva, pues no solo ella misma espía a los usuarios, "
+#~ "sino que además ayuda a empresas a espiarlos</a>."
+
 #, fuzzy
 #~| msgid ""
 #~| "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.";

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.346
retrieving revision 1.347
diff -u -b -r1.346 -r1.347
--- proprietary/po/fr.po        13 Jul 2020 10:40:56 -0000      1.346
+++ proprietary/po/fr.po        17 Jul 2020 19:02:14 -0000      1.347
@@ -6983,11 +6983,25 @@
 "\">appareils d'écoute permanente</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "La plupart des applis sont des logiciels malveillants, mais l'appli de "
@@ -11051,6 +11065,39 @@
 "contient un enregistreur de frappe <cite>[key logger]</cite></a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | The <a
+# | 
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>
+# | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# | 
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+#| "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+#| "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet.";
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
+msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+"Le <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\">niveau "
+"« Complet »</a> de télémétrie permet aux ingénieurs de Microsoft 
d'accéder, "
+"entre autres, à des clés de registre qui contiennent <a href=\"https://";
+"technet.microsoft.com/en-us/library/cc939702.aspx\">de l'information "
+"sensible comme le mot de passe administrateur</a>."
+
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
@@ -11893,3 +11940,18 @@
 #. type: Content of: <div><div><dl><dd><ul><li>
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "La plupart des applis sont des logiciels malveillants, mais l'appli de "
+#~ "campagne de Trump, ainsi que celle de Modi [NdT: Narendra Modi, candidat "
+#~ "aux élections présidentielles indiennes] l'est tout particulièrement, 
car "
+#~ "<a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
+#~ "hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+#~ "\">non seulement elle espionne les utilisateurs pour son propre compte, "
+#~ "mais elle aide des entreprises à les espionner</a>."

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary/po/it.po        13 Jul 2020 10:02:36 -0000      1.196
+++ proprietary/po/it.po        17 Jul 2020 19:02:14 -0000      1.197
@@ -7829,8 +7829,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 
@@ -11979,6 +11979,40 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+# | The <a
+# | 
[-href=\"https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level\";>-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>+}
+# | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# | 
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/configuration/";
+#| "configure-windows-telemetry-in-your-organization#full-level\"> &ldquo;"
+#| "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet.";
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
+msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+"La <a href=\"https://docs.microsoft.com/en-us/windows/configuration/";
+"configure-windows-telemetry-in-your-organization#full-level\"> modalità "
+"&ldquo;Completa&rdquo; della telemetria</a> permette allo staff di Microsoft "
+"di accedere, tra l'altro, a chiavi di registro che <a href=\"https://technet.";
+"microsoft.com/en-us/library/cc939702.aspx\">possono contenere password "
+"amministrative e altre informazioni sensibili</a>."
+
+#. type: Content of: <div><div><ul><li><p>
 # | <a
 # | 
[-href=\"http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping\";>-]
 # | 
{+href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping\";>+}

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary/po/ja.po        13 Jul 2020 10:02:36 -0000      1.204
+++ proprietary/po/ja.po        17 Jul 2020 19:02:14 -0000      1.205
@@ -6008,8 +6008,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 
@@ -9353,6 +9353,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
 "when-windows-10-is-sleeping\"> Intel devices will be able to listen for "

Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/malware-mobiles.de-diff.html 26 Jun 2020 23:31:13 -0000      
1.80
+++ proprietary/po/malware-mobiles.de-diff.html 17 Jul 2020 19:02:14 -0000      
1.81
@@ -631,8 +631,8 @@
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
@@ -1614,7 +1614,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/17 19:02:14 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/po/malware-mobiles.de.po        26 Jun 2020 23:31:13 -0000      
1.136
+++ proprietary/po/malware-mobiles.de.po        17 Jul 2020 19:02:14 -0000      
1.137
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1038,8 +1038,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary/po/malware-mobiles.es.po        27 Jun 2020 11:59:12 -0000      
1.181
+++ proprietary/po/malware-mobiles.es.po        17 Jul 2020 19:02:14 -0000      
1.182
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -875,11 +876,25 @@
 "\">dispositivos de escucha a tiempo completo</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "La mayoría de las aplicaciones son <cite>malware</cite>, pero la aplicación 
"

Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary/po/malware-mobiles.fr.po        27 Jun 2020 06:06:37 -0000      
1.199
+++ proprietary/po/malware-mobiles.fr.po        17 Jul 2020 19:02:14 -0000      
1.200
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-06-27 08:05+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -871,11 +872,25 @@
 "\">appareils d'écoute permanente</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "La plupart des applis sont des logiciels malveillants, mais l'appli de "

Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/malware-mobiles.it-diff.html 26 Jun 2020 23:31:13 -0000      
1.85
+++ proprietary/po/malware-mobiles.it-diff.html 17 Jul 2020 19:02:14 -0000      
1.86
@@ -599,8 +599,8 @@
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
@@ -1627,7 +1627,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/17 19:02:14 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/po/malware-mobiles.it.po        26 Jun 2020 23:31:13 -0000      
1.136
+++ proprietary/po/malware-mobiles.it.po        17 Jul 2020 19:02:14 -0000      
1.137
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -996,8 +996,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-mobiles.ja-diff.html 26 Jun 2020 23:31:13 -0000      
1.102
+++ proprietary/po/malware-mobiles.ja-diff.html 17 Jul 2020 19:02:14 -0000      
1.103
@@ -596,8 +596,8 @@
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
@@ -1473,7 +1473,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/17 19:02:14 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary/po/malware-mobiles.ja.po        26 Jun 2020 23:31:13 -0000      
1.127
+++ proprietary/po/malware-mobiles.ja.po        17 Jul 2020 19:02:14 -0000      
1.128
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -756,8 +756,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-mobiles.pot  26 Jun 2020 23:31:13 -0000      1.102
+++ proprietary/po/malware-mobiles.pot  17 Jul 2020 19:02:14 -0000      1.103
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -603,8 +603,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a "
-"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
 "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
 "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary/po/malware-mobiles.ru.po        27 Jun 2020 07:59:02 -0000      
1.238
+++ proprietary/po/malware-mobiles.ru.po        17 Jul 2020 19:02:14 -0000      
1.239
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -862,11 +863,25 @@
 "позволяет превращать их в штатные 
подслушивающие устройства."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "Большинство приложений вредоносны, но 
приложение кампании Трампа, как и "

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary/po/nl.po        13 Jul 2020 10:02:36 -0000      1.197
+++ proprietary/po/nl.po        17 Jul 2020 19:02:14 -0000      1.198
@@ -5422,8 +5422,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 
@@ -8710,6 +8710,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
 "when-windows-10-is-sleeping\"> Intel devices will be able to listen for "

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary/po/pl.po        13 Jul 2020 10:02:36 -0000      1.196
+++ proprietary/po/pl.po        17 Jul 2020 19:02:14 -0000      1.197
@@ -4882,8 +4882,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 
@@ -8191,6 +8191,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
 "when-windows-10-is-sleeping\"> Intel devices will be able to listen for "

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- proprietary/po/pot  13 Jul 2020 10:02:36 -0000      1.195
+++ proprietary/po/pot  17 Jul 2020 19:02:14 -0000      1.196
@@ -4610,8 +4610,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 
@@ -7432,6 +7432,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
 "when-windows-10-is-sleeping\"> Intel devices will be able to listen for "

Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary/po/proprietary-surveillance.de-diff.html        9 Jul 2020 
17:32:22 -0000       1.117
+++ proprietary/po/proprietary-surveillance.de-diff.html        17 Jul 2020 
19:02:14 -0000      1.118
@@ -299,9 +299,9 @@
 <span 
class="removed"><del><strong>href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;</em></ins></span>
     &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
-    engineers to access, among other things, registry keys &lt;a
-    href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
-    can contain sensitive information like administrator's login
+    engineers to access, among other things, registry keys &lt;a <span 
class="removed"><del><strong>href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"&gt;
+    which</em></ins></span> can contain sensitive information like 
administrator's login
  <span class="removed"><del><strong>password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Windows DRM</strong></del></span>
@@ -596,8 +596,8 @@
       <span class="removed"><del><strong>recorded</strong></del></span> <span 
class="inserted"><ins><em>are malware, but
     Trump's campaign app, like Modi's campaign app, is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
       calls and sent</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on</em></ins></span> them <span 
class="removed"><del><strong>and text messages and emails to
       snoopers&lt;/a&gt;.&lt;/p&gt;
 
@@ -756,86 +756,57 @@
   &lt;li id="M201709210"&gt;
     &lt;p&gt;In</em></ins></span> the <span class="removed"><del><strong>HTML 
pages returned to</strong></del></span> <span class="inserted"><ins><em>latest 
iThings system,
     &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated purpose of the JS 
injection is</strong></del></span> <span class="inserted"><ins><em>obvious way 
&lt;a
+      <span class="removed"><del><strong>users. The 
stated</strong></del></span> <span class="inserted"><ins><em>obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
+    know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use</em></ins></span> it <span 
class="removed"><del><strong>redirects</strong></del></span> <span 
class="inserted"><ins><em>without having your fingerprints taken. Users would 
have
-    no way to tell whether</em></ins></span> the
-      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
-      roughly 5 tracking libraries. Developers</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>have
-      confirmed</strong></del></span> <span class="inserted"><ins><em>on 
iThings &lt;a
+    &lt;p&gt;The iMessage app on iThings &lt;a
     
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number</em></ins></span> that the <span 
class="removed"><del><strong>non-premium version of</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>app does
-      JavaScript injection</strong></del></span>
-    <span class="inserted"><ins><em>server records these 
numbers</em></ins></span> for <span class="removed"><del><strong>tracking and 
display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>at least 
30 days.&lt;/p&gt;</em></ins></span>
+    a server every phone number that the user types into it&lt;/a&gt;; the
+    server records these numbers for at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span class="removed"><del><strong>paid proprietary 
apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of</strong></del></span> <span class="inserted"><ins><em>photos
+  &lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps</em></ins></span> them <span class="inserted"><ins><em>up 
to date on all your devices. Any edits you
-    make</em></ins></span> are <span class="removed"><del><strong>not in 
fact</strong></del></span> <span class="inserted"><ins><em>automatically 
updated everywhere. [&hellip;] &lt;/p&gt;&lt;/blockquote&gt;
+    take, and keeps them up to date on all your devices. Any edits you
+    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
-    &lt;p&gt;(From</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement
-  for that word</strong></del></span>
-    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span> <span 
class="inserted"><ins><em>a way to</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track 
users</strong></del></span> <span 
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT201104"&gt; 
deactivate
-    iCloud&lt;/a&gt;, but it's active</em></ins></span> by <span 
class="inserted"><ins><em>default so it still counts as a
+    &lt;p&gt;There is a way to
+    &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
     surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos of many celebrities&lt;/a&gt;. They needed</em></ins></span> 
to <span class="removed"><del><strong>ultrasound</strong></del></span> <span 
class="inserted"><ins><em>break Apple's
+    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
+    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
     security to get at them, but NSA can access any of them through &lt;a
     
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -843,83 +814,60 @@
   &lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data</em></ins></span> from <span 
class="removed"><del><strong>beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+  &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude to transmit users' 
personal
-       data</strong></del></span> <span class="inserted"><ins><em>iOS 
seem</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    Several &ldquo;features&rdquo; of iOS seem to exist
+    for no possible</em></ins></span> purpose <span 
class="inserted"><ins><em>other than surveillance&lt;/a&gt;.  Here is the &lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
-    &lt;p&gt;The</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
+  &lt;li id="M201401100"&gt;
+    &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing, 
or it</em></ins></span>
-    is <span class="removed"><del><strong>not enough
-to legitimize actions like this.  At this point, most users have
-stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
     &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on</strong></del></span> 
<span class="inserted"><ins><em>can be
+    tells Apple its geolocation&lt;/a&gt; by default, though that can be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track</em></ins></span> 
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
-    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
+    still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
-    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
-    to it.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
+    to install even gratis apps&lt;/a&gt;) without giving a valid
+    email address and receiving the verification code Apple sends
+    to it.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -929,63 +877,33 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions</em></ins></span> the <span 
class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening</em></ins></span> to <span 
class="removed"><del><strong>completely stop the tracking.  This is
-    yet another example of</strong></del></span> <span 
class="inserted"><ins><em>a song.  They send device identifying
+    &lt;p&gt;Xiaomi phones &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
+    visiting a website, listening to a song.  They send device identifying
     information too.&lt;/p&gt;
 
-    &lt;p&gt;Other</em></ins></span> nonfree <span 
class="removed"><del><strong>software pretending to obey the user,
-    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>programs snoop too. For instance, Spotify and
-    other streaming dis-services make</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
+    other streaming dis-services make a dossier about each user, and &lt;a
+    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
+    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
 
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;More than 73% of the most popular Android apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span class="inserted"><ins><em>dossier 
about each user,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they 
make</em></ins></span>
-    users <span class="removed"><del><strong>with third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>identify 
themselves</em></ins></span> to <span class="inserted"><ins><em>pay&lt;/a&gt;.  
Out, out, damned Spotify!&lt;/p&gt;
-
-    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span class="inserted"><ins><em>same wrongs 
when</em></ins></span> the <span class="removed"><del><strong>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they</strong></del></span> <span 
class="inserted"><ins><em>culprits</em></ins></span> are not <span 
class="removed"><del><strong>free software.  The clear way to say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes for granted that the usual analytics tools are
-  legitimate,</strong></del></span> <span 
class="inserted"><ins><em>Chinese,</em></ins></span>
-    but <span class="removed"><del><strong>is that valid?  Software developers 
have</strong></del></span> <span class="inserted"><ins><em>we condemn 
this</em></ins></span> no <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>matter who does it.&lt;/p&gt;
+    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
+    but we condemn this no matter who does it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to
-  <span class="removed"><del><strong>analyze</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising</em></ins></span>
-    what <span class="removed"><del><strong>users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the &ldquo;consent&rdquo; was 
for.&lt;/p&gt;</em></ins></span>
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
-    &lt;p&gt;An</em></ins></span> Android <span 
class="removed"><del><strong>apps (but not</strong></del></span> <span 
class="inserted"><ins><em>phone was observed to track location even while
+  &lt;li id="M201811230"&gt;
+    &lt;p&gt;An Android phone was observed to track location even while
     in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
+    airplane mode.  Instead, &lt;a
+    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
     it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -999,16 +917,15 @@
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data</em></ins></span> to <span 
class="removed"><del><strong>100</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android)</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>location 
tracking, you must
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
     disable Google Play itself to completely stop the tracking.  This is
     yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
@@ -1458,8 +1375,8 @@
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of the <span class="removed"><del><strong>JS 
injection</strong></del></span> <span class="inserted"><ins><em>5,855 Android 
apps studied by researchers were found to snoop
     and collect information about its users&lt;/a&gt;.  40% of the apps were
     found to insecurely snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
@@ -1497,8 +1414,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers can &lt;a
+    &lt;p&gt;Tracking software in popular Android apps</em></ins></span>
+    is <span class="inserted"><ins><em>pervasive and sometimes very clever. 
Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
@@ -1512,7 +1429,8 @@
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.)&lt;/small&gt;&lt;/p&gt;
+    referring</em></ins></span> to <span class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>zero price.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
@@ -1520,36 +1438,58 @@
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that, and deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy; on the 
contrary,</em></ins></span> it <span 
class="removed"><del><strong>redirects</strong></del></span>
+    <span class="inserted"><ins><em>worked in various ways to prevent that, 
and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
+    for</em></ins></span> the
+      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android 
apps,</em></ins></span> and <span class="removed"><del><strong>also uses
+      roughly 5 tracking libraries. Developers</strong></del></span>
+    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice</em></ins></span> of <span class="removed"><del><strong>this 
app</strong></del></span> <span class="inserted"><ins><em>their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job of preventing apps from
+    &lt;p&gt;Could Google</em></ins></span> have
+      <span class="removed"><del><strong>confirmed that the non-premium 
version</strong></del></span> <span class="inserted"><ins><em>done a better 
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>app does
+      JavaScript injection</strong></del></span> <span 
class="inserted"><ins><em>source code</em></ins></span> for <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>these apps,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A</strong></del></span>
 study
+    <span class="inserted"><ins><em>the source code somehow to determine 
whether they mistreat users</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt; found that 90%</strong></del></span>
+    <span class="inserted"><ins><em>various ways. If it did a good 
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or 
less
+    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>app developers are 
clever
+    enough to outsmart</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    Google to protect us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span class="inserted"><ins><em>source 
code to</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
-    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop on users&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;</em></ins></span>
+    &lt;p&gt;Apps for BART &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop</em></ins></span> on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
@@ -1557,11 +1497,14 @@
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201705040"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;</em></ins></span>
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by TV <span 
class="removed"><del><strong>programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
@@ -1581,11 +1524,13 @@
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of Android apps can collude
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;</em></ins></span>
+    &lt;p&gt;Pairs of <span class="removed"><del><strong>Android apps can 
collude to transmit users' personal</strong></del></span> <span 
class="inserted"><ins><em>Android apps can collude
     to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
@@ -1610,50 +1555,101 @@
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user</em></ins></span> data to <span class="removed"><del><strong>servers. 
&lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app tracks &lt;a
-    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611280"&gt;
+    &lt;p&gt;The Uber</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>tracks</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo; for surveillance is inadequate as a protection against
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>user's
+    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading</strong></del></span> <span 
class="inserted"><ins><em>inadequate as a protection against
     massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611160"&gt;
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated the privacy and security of
-    283 Android VPN apps concluded that &ldquo;in spite of the promises
-    for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may be unawarely subject to poor security
+    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>privacy</em></ins></span> and <span 
class="removed"><del><strong>Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>security of
+    283 Android VPN apps concluded</em></ins></span> that <span 
class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>&ldquo;in 
spite</em></ins></span> of <span class="removed"><del><strong>hiding it in an 
obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's</strong></del></span> <span 
class="inserted"><ins><em>the promises
+    for</em></ins></span> privacy, <span class="removed"><del><strong>we must 
prevent Google</strong></del></span> <span 
class="inserted"><ins><em>security,</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span class="inserted"><ins><em>anonymity 
given by</em></ins></span> the <span class="removed"><del><strong>first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>majority</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example</strong></del></span> <span 
class="inserted"><ins><em>VPN
+    apps&mdash;millions</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>users 
may</em></ins></span> be <span class="removed"><del><strong>almost
+    unthinkable with free software.&lt;/p&gt;
+
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;More than 73% of</strong></del></span> <span 
class="inserted"><ins><em>unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
-    privacy:&lt;/p&gt;
+    &lt;p&gt;Following is a non-exhaustive list, taken from</em></ins></span> 
the <span class="removed"><del><strong>most popular 
Android</strong></del></span> <span class="inserted"><ins><em>research paper,
+    of some proprietary VPN</em></ins></span> apps
+  <span class="removed"><del><strong>&lt;a 
href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral</strong></del></span> <span class="inserted"><ins><em>that track 
users</em></ins></span> and <span class="removed"><del><strong>location 
information&lt;/a&gt; of</strong></del></span> <span 
class="inserted"><ins><em>infringe</em></ins></span> their <span 
class="removed"><del><strong>users with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span>
+    <span class="inserted"><ins><em>privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show them targeted ads.&lt;/dd&gt;
+      meant</em></ins></span> to <span class="inserted"><ins><em>track users 
and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
       permissions upon installation, meaning it has full access to users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps and also core system logs. TigerVPN developers have
-      confirmed this.&lt;/dd&gt;
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="removed"><del><strong>say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>read logs</em></ins></span>
+      for <span class="removed"><del><strong>granted that the usual analytics 
tools are
+  legitimate, but is that valid?  Software</strong></del></span> <span 
class="inserted"><ins><em>other apps and also core system logs. 
TigerVPN</em></ins></span> developers have <span 
class="removed"><del><strong>no right</strong></del></span>
+      <span class="inserted"><ins><em>confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
-      may turn them over to the UK government if requested.&lt;/dd&gt;
+      &lt;dd&gt;Sends traffic</em></ins></span> to
+  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
+  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect</strong></del></span> <span class="inserted"><ins><em>LinkedIn. 
Also, it stores detailed logs and
+      may turn them over</em></ins></span> to <span 
class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>the UK government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
@@ -1662,7 +1658,8 @@
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and 
<span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span class="inserted"><ins><em>also uses 
roughly
       five tracking libraries. Developers of this app have confirmed that
       the non-premium version of the app does JavaScript injection for
       tracking</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user and displaying ads.&lt;/dd&gt;
@@ -3745,7 +3742,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/09 17:32:22 $
+$Date: 2020/07/17 19:02:14 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- proprietary/po/proprietary-surveillance.de.po       9 Jul 2020 17:32:23 
-0000       1.332
+++ proprietary/po/proprietary-surveillance.de.po       17 Jul 2020 19:02:14 
-0000      1.333
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -568,12 +568,29 @@
 "Ü.]</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | The <a
+# | 
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>
+# | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# | 
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+#| "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+#| "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet.";
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
 msgid ""
 "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-";
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "<a href=\"https://docs.microsoft.com/de-de/windows/privacy/configure-windows-";
@@ -1177,8 +1194,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/proprietary-surveillance.es.po       11 Jul 2020 10:31:47 
-0000      1.52
+++ proprietary/po/proprietary-surveillance.es.po       17 Jul 2020 19:02:14 
-0000      1.53
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-07-11 12:17+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -419,12 +420,29 @@
 "«Completo» en la configuración predefinida</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | The <a
+# | 
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>
+# | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# | 
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+#| "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+#| "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet.";
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
 msgid ""
 "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-";
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
@@ -851,11 +869,25 @@
 "\">#SpywareInTelephones</a>)</span>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "La mayoría de las aplicaciones son <cite>malware</cite>, pero la aplicación 
"

Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.514
retrieving revision 1.515
diff -u -b -r1.514 -r1.515
--- proprietary/po/proprietary-surveillance.fr.po       10 Jul 2020 11:26:36 
-0000      1.514
+++ proprietary/po/proprietary-surveillance.fr.po       17 Jul 2020 19:02:15 
-0000      1.515
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-07-10 13:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -412,12 +413,29 @@
 "défaut le niveau de télémétrie à « Complet »</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | The <a
+# | 
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>
+# | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# | 
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+#| "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+#| "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet.";
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
 msgid ""
 "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-";
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "Le <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
@@ -847,11 +865,25 @@
 "\">#SpywareInTelephones</a>)</span>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "La plupart des applis sont des logiciels malveillants, mais l'appli de "

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary/po/proprietary-surveillance.it-diff.html        9 Jul 2020 
17:32:23 -0000       1.183
+++ proprietary/po/proprietary-surveillance.it-diff.html        17 Jul 2020 
19:02:15 -0000      1.184
@@ -296,8 +296,8 @@
     
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
     &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
     engineers to access, among other things, registry keys</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
-    can contain sensitive information like administrator's login
+    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"&gt;
+    which can contain sensitive information like administrator's login
     password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -597,8 +597,8 @@
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop</em></ins></span> 
on <span class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop</em></ins></span> on 
<span class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
   &lt;p&gt;With free software apps,</strong></del></span> users <span 
class="removed"><del><strong>could &lt;em&gt;make sure&lt;/em&gt; that they 
don't snoop.&lt;/p&gt;
   &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
@@ -655,32 +655,27 @@
     the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> that <span 
class="removed"><del><strong>spell out
 what they</strong></del></span> <span class="inserted"><ins><em>we know nearly 
all portable
     phones have. It may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>&lt;a
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of <span class="removed"><del><strong>hiding it in 
an obscurely worded EULA.&lt;/p&gt;
+    lots of bugs in</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal 
information</strong></del></span> <span 
class="inserted"><ins><em>bugs</em></ins></span> in the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phones' 
radio software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201307000"&gt;
+    &lt;p&gt;Portable phones with GPS &lt;a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send their GPS location</em></ins></span> on <span 
class="removed"><del><strong>users, instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>remote 
command, and users cannot stop
+    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>will 
eventually require all new portable phones</em></ins></span>
+    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google
+and other companies from getting this personal information in the first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
-    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send</em></ins></span> their <span 
class="removed"><del><strong>permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and</strong></del></span> <span 
class="inserted"><ins><em>GPS</em></ins></span> location <span 
class="removed"><del><strong>tracking, you must
-    disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
-    yet another example of nonfree software pretending</strong></del></span>
-    <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones
-    to have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -690,12 +685,18 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally &lt;a
-    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
+    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.  This is
+    yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable</strong></del></span> <span class="inserted"><ins><em>Tencent 
Safe
-    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    unthinkable</strong></del></span> <span class="inserted"><ins><em>check 
URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent 
collaborates</em></ins></span>
     with <span class="removed"><del><strong>free software.&lt;/p&gt;
 
@@ -968,7 +969,7 @@
     href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
     users identify themselves</em></ins></span> to <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
 
-    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>same wrongs when the 
culprits are not Chinese,
+    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
     but we condemn this no matter who does it.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -981,8 +982,8 @@
 
   &lt;li id="M201811230"&gt;
     &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
+    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
+      GPS, take photographs, read text messages, read 
call,</strong></del></span> location <span class="inserted"><ins><em>data while 
in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
     it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
@@ -1062,30 +1063,30 @@
     &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
       the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="inserted"><ins><em>Android 
that &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal</em></ins></span> data <span 
class="removed"><del><strong>on the user's computer, but it does surveillance
-      too:</strong></del></span> <span class="inserted"><ins><em>to 
Motorola&lt;/a&gt;.&lt;/p&gt;
+    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>user's list</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends app developers &lt;a
     
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+    the personal details</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>user's 
list</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, 
instead</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span>
-    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
 
     &lt;p&gt;However, to truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
       numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
@@ -1140,24 +1141,14 @@
 
    &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
-    <span class="inserted"><ins><em>report even which page</em></ins></span> 
the user <span class="removed"><del><strong>must explicitly opt-in before the 
app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span class="inserted"><ins><em>report even which page</em></ins></span> 
the user <span class="removed"><del><strong>must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>reads at what 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>the phone,</strong></del></span> <span 
class="inserted"><ins><em>Applications&lt;/h3&gt;
+  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1169,33 +1160,42 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
-    &lt;p&gt;Some Avast</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>AVG extensions
-    for Firefox and Chrome were found to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop on users' detailed browsing habits&lt;/a&gt;. 
Mozilla</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span> <span 
class="inserted"><ins><em>Google
-    removed</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
-    once more</em></ins></span> how <span 
class="removed"><del><strong>&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>unsafe nonfree software can be. Tools that are 
supposed
+    &lt;p&gt;Some Avast and AVG extensions
+    for Firefox and Chrome were found to &lt;a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
+    removed</em></ins></span> the <span class="removed"><del><strong>app takes 
effect. However,</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
+    once more how unsafe nonfree software can be. Tools that are supposed
     to protect a proprietary system are, instead, infecting it with
-    additional malware (the system itself being</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;
+    additional malware (the system itself being</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
+    often</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts</strong></del></span> <span class="inserted"><ins><em>legal 
threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>data in the phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes</em></ins></span> it <span class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;The fact that this is used</em></ins></span> for <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the 
ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software</em></ins></span>
+    &lt;p&gt;This <span 
class="removed"><del><strong>example</strong></del></span> illustrates <span 
class="removed"><del><strong>how &ldquo;getting the user's consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>that making unauthorized copies of nonfree 
software</em></ins></span>
     is <span class="removed"><del><strong>inadequate as</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
         surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cure for the injustice of nonfree software. It may 
avoid
     paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
@@ -1515,53 +1515,34 @@
     sent personal data</em></ins></span> to <span 
class="removed"><del><strong>the
        manufacturer&lt;/a&gt;. Guess what?
       &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps 
that</em></ins></span>
-    way <span class="removed"><del><strong>to access</strong></del></span> 
<span class="inserted"><ins><em>and released them, apparently not realizing 
that all</em></ins></span> the <span class="removed"><del><strong>data&lt;/a&gt;
-      collected by</strong></del></span> <span 
class="inserted"><ins><em>personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
+    way <span class="removed"><del><strong>to access the data&lt;/a&gt;
+      collected by</strong></del></span> <span class="inserted"><ins><em>and 
released them, apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>manufacturer's 
snooping.&lt;/p&gt;
+    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;That</strong></del></span>
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span>
     <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>spy on children</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1571,43 +1552,42 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users, and 
redirecting
-    them to phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
-    difficult.&lt;/p&gt;
-
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
-    there</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span> 
really
-<span class="removed"><del><strong>clean since &lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>do.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note</strong></del></span> <span class="inserted"><ins><em>apparent violation 
of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This 
proves</em></ins></span>
+    that the <span class="removed"><del><strong>specific sabotage method 
Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>development 
platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>protect their 
users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1617,24 +1597,27 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>users. 
Other technical flaws were
-    found as well.&lt;/p&gt;
-
-    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows</strong></del></span> <span class="inserted"><ins><em>Google 
Play had one or more malicious functionalities, such as</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
       &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>Parliament
-  this way, because</strong></del></span>
-    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
-    apps.&rdquo; These apps are gratis, but</em></ins></span> they <span 
class="removed"><del><strong>pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
+    difficult.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>are &lt;em&gt;not&lt;/em&gt;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree 
apps</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP 
phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
       
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
+    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1645,248 +1628,160 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising&mdash;that could
+    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;.</em></ins></span> The 
<span class="removed"><del><strong>Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's 
server&lt;/a&gt;.</em></ins></span> The <span 
class="removed"><del><strong>Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>company</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding that it 
notify</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>will do
-    with</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;We think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>using it to outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>about a side issue. 
What the company does
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only the
-      Kindle:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;</em></ins></span>
-    report <span class="removed"><del><strong>even which 
page</strong></del></span> <span class="inserted"><ins><em>on</em></ins></span> 
the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>user's 
actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook can correlate the data it obtains from the same machine via
-    various apps. Some of them</em></ins></span> send <span 
class="removed"><del><strong>lots</strong></del></span> <span 
class="inserted"><ins><em>Facebook detailed information about
-    the user's activities in the app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
-
-    &lt;p&gt;This spying occurs regardless</em></ins></span> of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>whether the user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+    various apps. Some of them send Facebook detailed information about
+    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>the 
app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;That's easy to do because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>system has 
no authentication</strong></del></span> <span class="inserted"><ins><em>user's 
location even</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>users disable &ldquo;location
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
-    tracking, but most users will</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>tricked by</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables the phone company to track</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;We expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>save
-    a recording. But we can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
-  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary 
software</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn to care much less about sports, you will 
benefit</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
     of the 5,855 Android apps studied by researchers were found to snoop
-    and collect</em></ins></span> information about <span 
class="removed"><del><strong>drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span> <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
-    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
-      really a matter of</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by 
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
-    source code they cannot look at.</em></ins></span>  The other
-      <span class="removed"><del><strong>cases mentioned are done by 
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps 
might be snooping</em></ins></span>
-    in <span class="removed"><del><strong>the car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
-    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>c.&lt;/a&gt;). The company says it 
doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>free software
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information</em></ins></span> about <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to <span 
class="removed"><del><strong>spy on their renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke: The</strong></del></span>
-    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to 
each</em></ins></span>
-    other <span class="removed"><del><strong>day a woman came 
up</strong></del></span> <span class="inserted"><ins><em>but 
not</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>the server's database.&lt;/p&gt;
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see 
you</strong></del></span> <span class="inserted"><ins><em>dis-service
-    spy</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. 
It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just 
broadcasts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if the 
image</strong></del></span> <span class="inserted"><ins><em>after going to a 
movie&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps</em></ins></span>
-    is <span class="removed"><del><strong>coming from 
the</strong></del></span> <span class="inserted"><ins><em>pervasive and 
sometimes very clever. Some trackers can &lt;a
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a</em></ins></span> user's <span class="removed"><del><strong>own
-    computer, the TV reports what it is. The existence 
of</strong></del></span> <span class="inserted"><ins><em>movements 
around</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>physical store by noticing WiFi
+    follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1894,10 +1789,9 @@
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book</em></ins></span> to
-    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>developer's server.&lt;/p&gt;
+    book to developer's server.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>surveillance, even if it 
were</strong></del></span> <span class="inserted"><ins><em>words
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -1907,80 +1801,54 @@
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did</em></ins></span> not <span 
class="removed"><del><strong>hidden as</strong></del></span> <span 
class="inserted"><ins><em>intend to make these apps spy; on the 
contrary,</em></ins></span> it <span 
class="removed"><del><strong>was</strong></del></span>
-    <span class="inserted"><ins><em>worked</em></ins></span> in <span 
class="inserted"><ins><em>various ways to prevent that, and 
deleted</em></ins></span> these <span class="removed"><del><strong>TVs, does 
not legitimize</strong></del></span> <span class="inserted"><ins><em>apps after
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on</strong></del></span> <span class="inserted"><ins><em>snooping of these 
apps.&lt;/p&gt;
+    for the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice 
of</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was</strong></del></span> <span 
class="inserted"><ins><em>being
-    nonfree. It also distributes its own nonfree apps, such</em></ins></span> 
as <span class="inserted"><ins><em>Google Play,
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>preventing apps from
-    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
-    to <span class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally inadequate.
-      And</strong></del></span> <span class="inserted"><ins><em>inspect 
executable proprietary apps to see</em></ins></span> what <span 
class="removed"><del><strong>happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>they 
do.&lt;/p&gt;
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps, and study
-    the source code somehow</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
     various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs</strong></del></span> <span 
class="inserted"><ins><em>app developers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>clever
-    enough</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying</strong></del></span> <span class="inserted"><ins><em>checking.&lt;/p&gt;
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend</em></ins></span> on 
-      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>each 
other.&lt;/p&gt;
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> <span 
class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that</em></ins></span> track <span 
class="removed"><del><strong>you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
-    to <span class="removed"><del><strong>turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>ultrasound from 
beacons placed in stores or played</em></ins></span> by <span 
class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV
-    programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704260"&gt;
+  &lt;li id="M201704260"&gt;
     &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands</em></ins></span> to <span 
class="inserted"><ins><em>personal data in</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
@@ -2770,57 +2638,124 @@
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;
+    &lt;p&gt;Data collected by devices such as the</em></ins></span> Nest 
<span class="removed"><del><strong>Cam &ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>thermostat,</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>Philips
+    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ 
garage opener</em></ins></span> and <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span> <span class="inserted"><ins><em>the 
Sonos
+    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>servers</em></ins></span>
+    the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe</strong></del></span> <span 
class="inserted"><ins><em>devices are tethered to. Moreover, they 
are</em></ins></span> made <span class="removed"><del><strong>&ldquo;Digital 
Editions,&rdquo; the e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
+    <span class="inserted"><ins><em>Alexa. As a result, 
Amazon</em></ins></span> has a <span class="removed"><del><strong>built-in cell 
phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes</strong></del></span> <span 
class="inserted"><ins><em>very precise picture of users' life
+    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+    in the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user is still
+    paying for the subscription,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
     specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use of ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;
+    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
+      really</strong></del></span>
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
+      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
+    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in that country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done 
by malware. The other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
@@ -2831,48 +2766,97 @@
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
     offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+    sending usage</em></ins></span> data <span 
class="removed"><del><strong>remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>back 
over</em></ins></span> the <span class="removed"><del><strong>car's location at 
any time. (See</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
-    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are 
designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen to everyone in</em></ins></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
     a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;
+    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>to get the data
+      and hand</strong></del></span> <span class="inserted"><ins><em>is 
air-gapped,</em></ins></span> it <span class="removed"><del><strong>over, the 
state can store it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest</strong></del></span>
 
-  &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
-    data about</em></ins></span> the <span 
class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201310260"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</em></ins></span>
     Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer, the TV reports what it is. The existence of a way to
+    disable the surveillance, even if it were not hidden as it was in
+    these TVs, does not legitimize the surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
-    &lt;p&gt;Tommy Hilfiger clothing &lt;a
-    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span class="removed"><del><strong>shows that laws requiring 
products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if a user declines consent?  Probably the 
TV</strong></del></span> will <span class="removed"><del><strong>say, 
&ldquo;Without your consent to tracking,</strong></del></span> <span 
class="inserted"><ins><em>teach</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>find it normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2882,16 +2866,22 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>online
-      social media participation, Tivo can</strong></del></span> <span 
class="inserted"><ins><em>an Android app &lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
+    that <span class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
+    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407090"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
     to report its location to someone else and to transmit conversations
@@ -2907,30 +2897,33 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201912171"&gt;
-    &lt;p&gt;Most modern cars</em></ins></span> now &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible, as it involves
-    cracking the car's computer, which is always hidden</em></ins></span> and 
<span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>running with
-    proprietary software.&lt;/p&gt;
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
+    the <span class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>user, access to the data is nearly impossible, 
as it involves
+    cracking the car's computer, which is always hidden and 
running</em></ins></span> with <span class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span>
+    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
-    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go</em></ins></span> to <span class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>a 
junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data, and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to a junkyard the driver's personal data 
goes</em></ins></span> with <span class="removed"><del><strong>online 
purchases&lt;/a&gt;, exposing all users</strong></del></span>
+    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902011"&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
+    near-complete access</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
@@ -3545,7 +3538,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/09 17:32:23 $
+$Date: 2020/07/17 19:02:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.344
retrieving revision 1.345
diff -u -b -r1.344 -r1.345
--- proprietary/po/proprietary-surveillance.it.po       9 Jul 2020 17:32:23 
-0000       1.344
+++ proprietary/po/proprietary-surveillance.it.po       17 Jul 2020 19:02:15 
-0000      1.345
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -560,8 +560,10 @@
 # | 
{+href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>+}
 # | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
 # | to access, among other things, registry keys <a
-# | href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which
-# | can contain sensitive information like administrator's login password</a>.
+# | 
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
 #, fuzzy
 #| msgid ""
 #| "The <a href=\"https://docs.microsoft.com/en-us/windows/configuration/";
@@ -574,8 +576,9 @@
 "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-";
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "La <a href=\"https://docs.microsoft.com/en-us/windows/configuration/";
@@ -1152,8 +1155,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary/po/proprietary-surveillance.ja-diff.html        9 Jul 2020 
17:32:23 -0000       1.200
+++ proprietary/po/proprietary-surveillance.ja-diff.html        17 Jul 2020 
19:02:15 -0000      1.201
@@ -295,8 +295,8 @@
     
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
     &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
     engineers to access, among other things, registry keys &lt;a
-    href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
-    can contain sensitive information like administrator's login
+    
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"&gt;
+    which can contain sensitive information like administrator's login
     password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -593,8 +593,8 @@
   &ldquo;free&rdquo;&mdash;they</strong></del></span> are <span 
class="removed"><del><strong>not free software.  The clear way to say
   &ldquo;zero price&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>malware, but
     Trump's campaign app, like Modi's campaign app,</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>&lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
     &lt;p&gt;The article <span class="removed"><del><strong>takes for 
granted</strong></del></span> <span 
class="inserted"><ins><em>says</em></ins></span> that <span 
class="removed"><del><strong>the usual analytics tools are
@@ -690,11 +690,11 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>Apple 
devices in China to</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Tencent Safe
+        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>Apple devices in China to</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
     Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black list most certainly
+    with</em></ins></span> the <span class="removed"><del><strong>server 
records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most 
certainly
     contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
     dissenters in China and Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
@@ -796,7 +796,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can,</em></ins></span> and <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>regularly does, &lt;a
+    &lt;p&gt;Apple can,</em></ins></span> and <span 
class="removed"><del><strong>get other</strong></del></span> <span 
class="inserted"><ins><em>regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
     remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
@@ -820,7 +820,7 @@
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get</em></ins></span> other info too.&lt;/p&gt;
+    get other</em></ins></span> info too.&lt;/p&gt;
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
@@ -910,13 +910,13 @@
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
-    what</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track</em></ins></span> location 
<span class="inserted"><ins><em>even while
-    in airplane mode. It didn't send the location data while in
+    &lt;p&gt;An Android phone was observed to track location even while
+    in airplane mode. It didn't send</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
     it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
@@ -1012,8 +1012,7 @@
     &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
       it tries to get</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>user's list</strong></del></span> 
<span class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>user's list</strong></del></span> 
<span class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
     legitimize actions like this.  At this point, most users have stopped
@@ -1022,7 +1021,8 @@
     honestly identify the information it collects on users, instead of
     hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    &lt;p&gt;However, to truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
@@ -1134,8 +1134,8 @@
       twisted ways that they present snooping as a way</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
     reports information</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The 
result</em></ins></span> is
-    <span class="inserted"><ins><em>often</em></ins></span> a <span 
class="removed"><del><strong>typical example</strong></del></span> <span 
class="inserted"><ins><em>legal threat demanding a lot of money.&lt;/p&gt;
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>identify who</em></ins></span> is <span 
class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    often</em></ins></span> a <span class="removed"><del><strong>typical 
example</strong></del></span> <span class="inserted"><ins><em>legal threat 
demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;
@@ -1546,20 +1546,21 @@
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
   &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
+    that the policies of</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span class="inserted"><ins><em>development 
platform are ineffective at
     preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf 
has</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span class="inserted"><ins><em>surveillance 
feature for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
   access its computers remotely</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
     recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
@@ -1754,12 +1755,12 @@
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
     of</em></ins></span> the <span class="removed"><del><strong>company already
       monitors. Tivo customers are unaware they're being 
watched</strong></del></span> <span class="inserted"><ins><em>5,855 Android 
apps studied</em></ins></span> by
-      <span class="removed"><del><strong>advertisers. By combining TV 
viewing</strong></del></span> <span class="inserted"><ins><em>researchers were 
found to snoop
-    and collect</em></ins></span> information <span 
class="removed"><del><strong>with online
+      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
       social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>about its 
users&lt;/a&gt;.  40% of the apps were
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span> <span class="inserted"><ins><em>researchers were 
found</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>collect 
information about its users&lt;/a&gt;.  40% of the apps were
     found</em></ins></span> to <span class="removed"><del><strong>be
       picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
@@ -1829,12 +1830,22 @@
       could spy this way.&lt;/p&gt;
 
       &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>physical store by noticing WiFi
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app &lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted</strong></del></span> <span 
class="inserted"><ins><em>email addresses&lt;/a&gt; in user's address
+    book to developer's server.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
+    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+    referring</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>zero 
price.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;!-- #SpywareAtPlay --&gt;
@@ -1847,57 +1858,47 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>email addresses&lt;/a&gt; in user's address
-    book</em></ins></span> to <span class="inserted"><ins><em>developer's 
server.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>words
-    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
-
   <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of data about their users</strong></del></span>
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls</em></ins></span> and <span class="removed"><del><strong>their 
users' 
-      friends</strong></del></span> <span class="inserted"><ins><em>sent 
them</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+    calls</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>sent them and text messages and 
emails</em></ins></span> to <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Even nastier, they do it through ad networks that merge the data
-      collected by various cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>text messages</em></ins></span> and <span 
class="removed"><del><strong>sites made by different 
-      companies.&lt;/p&gt;
+    &lt;p&gt;Google did not intend to make these apps spy; 
on</em></ins></span> the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; 
even</strong></del></span> <span class="inserted"><ins><em>contrary, it
+    worked in various ways to prevent that, and deleted these apps after
+    discovering</em></ins></span> what <span 
class="removed"><del><strong>their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>they did. So we cannot blame Google specifically
+    for the snooping of these apps.&lt;/p&gt;
 
-      &lt;p&gt;They use this data</strong></del></span> <span 
class="inserted"><ins><em>emails</em></ins></span> to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android 
apps,</em></ins></span> and <span class="removed"><del><strong>you can't trust 
a computer with 
+      a</strong></del></span>
+    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice of their being
+    nonfree. It also distributes its own</em></ins></span> nonfree <span 
class="removed"><del><strong>operating system.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Google did not intend</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>make these apps spy; on the contrary, it
-    worked in various ways to prevent that,</em></ins></span> and <span 
class="removed"><del><strong>hunt</strong></del></span> <span 
class="inserted"><ins><em>deleted these apps after
-    discovering what they did. So we cannot blame Google 
specifically</em></ins></span>
-    for <span class="removed"><del><strong>&ldquo;whales&rdquo; who can be led 
to spend a lot</strong></del></span> <span class="inserted"><ins><em>the 
snooping</em></ins></span> of <span class="removed"><del><strong>money. 
They</strong></del></span> <span class="inserted"><ins><em>these apps.&lt;/p&gt;
-
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
-    nonfree. It</em></ins></span> also <span class="removed"><del><strong>use 
a back door to</strong></del></span> <span 
class="inserted"><ins><em>distributes its own nonfree apps, such as Google Play,
-    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps</strong></del></span> 
<span class="inserted"><ins><em>apps, such as Google Play,</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job of preventing apps from
+    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>wide range</strong></del></span> <span 
class="inserted"><ins><em>better job</em></ins></span> of <span 
class="removed"><del><strong>data about their users and their users' 
+      friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier,</strong></del></span> <span 
class="inserted"><ins><em>preventing apps from
     cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
+    to inspect executable proprietary apps to see what</em></ins></span> they 
<span class="removed"><del><strong>do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>data
+      collected by various cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps,</em></ins></span> and 
<span class="removed"><del><strong>sites made by different 
+      companies.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
+      &lt;p&gt;They use this data</strong></del></span> <span 
class="inserted"><ins><em>study
+    the source code somehow</em></ins></span> to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
     various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
+    enough</em></ins></span> to <span class="removed"><del><strong>buy things, 
and hunt</strong></del></span> <span class="inserted"><ins><em>outsmart the 
checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
@@ -1905,20 +1906,20 @@
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
+    &lt;p&gt;Apps</em></ins></span> for <span 
class="removed"><del><strong>&ldquo;whales&rdquo; who</strong></del></span> 
<span class="inserted"><ins><em>BART &lt;a
     
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>be led</strong></del></span> <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
+    to <span class="removed"><del><strong>spend</strong></del></span> <span 
class="inserted"><ins><em>ultrasound from beacons placed in stores or played by 
TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1931,8 +1932,9 @@
   &lt;li id="M201704190"&gt;
     &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
+    distributing</em></ins></span> a <span 
class="removed"><del><strong>lot</strong></del></span> <span 
class="inserted"><ins><em>spyware app for its headphones&lt;/a&gt;.  
Specifically,
+    the app would record the names</em></ins></span> of <span 
class="removed"><del><strong>money. They 
+      also</strong></del></span> <span class="inserted"><ins><em>the audio 
files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
@@ -1954,8 +1956,8 @@
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
     announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
     on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets when they use
-    its search engine.&lt;/p&gt;
+    about the users' searches that Google normally gets when 
they</em></ins></span> use
+    <span class="inserted"><ins><em>its search engine.&lt;/p&gt;
 
     &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
@@ -1968,7 +1970,7 @@
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data to</em></ins></span> a <span 
class="removed"><del><strong>back</strong></del></span> <span 
class="inserted"><ins><em>Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -2270,7 +2272,7 @@
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
     &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
-    use a back door to</em></ins></span> manipulate the <span 
class="removed"><del><strong>game play</strong></del></span> <span 
class="inserted"><ins><em>game play for specific players.&lt;/p&gt;
+    use a back</em></ins></span> door to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>manipulate the game play for specific 
players.&lt;/p&gt;
 
     &lt;p&gt;While the article describes gratis games, games that cost money
     can use the same tactics.&lt;/p&gt;
@@ -2971,7 +2973,7 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201612230"&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates the potential</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
+    creates</em></ins></span> the <span class="removed"><del><strong>game 
play</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
 
       &lt;p&gt;While</strong></del></span> the <span 
class="removed"><del><strong>article describes gratis games, games that cost 
money</strong></del></span> <span class="inserted"><ins><em>most intimate
     surveillance ever. All it takes to make this potential real &lt;a
@@ -3386,7 +3388,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/09 17:32:23 $
+$Date: 2020/07/17 19:02:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- proprietary/po/proprietary-surveillance.ja.po       9 Jul 2020 17:32:23 
-0000       1.326
+++ proprietary/po/proprietary-surveillance.ja.po       17 Jul 2020 19:02:15 
-0000      1.327
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -448,8 +448,9 @@
 "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-";
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 
@@ -871,8 +872,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- proprietary/po/proprietary-surveillance.pot 9 Jul 2020 17:32:23 -0000       
1.265
+++ proprietary/po/proprietary-surveillance.pot 17 Jul 2020 19:02:15 -0000      
1.266
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -347,8 +347,9 @@
 
"href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>
 "
 "&ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to "
 "access, among other things, registry keys <a "
-"href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which can "
-"contain sensitive information like administrator's login password</a>."
+"href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
 "
+"which can contain sensitive information like administrator's login "
+"password</a>."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -634,8 +635,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a "
-"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
 "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
 "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.610
retrieving revision 1.611
diff -u -b -r1.610 -r1.611
--- proprietary/po/proprietary-surveillance.ru.po       10 Jul 2020 07:31:58 
-0000      1.610
+++ proprietary/po/proprietary-surveillance.ru.po       17 Jul 2020 19:02:15 
-0000      1.611
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -408,12 +409,29 @@
 "a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | The <a
+# | 
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>
+# | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# | 
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+#| "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+#| "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet.";
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
 msgid ""
 "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-";
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "<a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-";
@@ -836,11 +854,25 @@
 "\">#SpywareInTelephones</a>)</span>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "Большинство приложений вредоносны, но 
приложение кампании Трампа, как и "

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary/po/proprietary.de-diff.html     13 Jul 2020 10:02:36 -0000      
1.163
+++ proprietary/po/proprietary.de-diff.html     17 Jul 2020 19:02:15 -0000      
1.164
@@ -248,8 +248,8 @@
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
@@ -327,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary/po/proprietary.de.po    13 Jul 2020 10:02:36 -0000      1.204
+++ proprietary/po/proprietary.de.po    17 Jul 2020 19:02:15 -0000      1.205
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -493,8 +493,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary/po/proprietary.es.po    15 Jul 2020 11:30:09 -0000      1.295
+++ proprietary/po/proprietary.es.po    17 Jul 2020 19:02:15 -0000      1.296
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -368,11 +369,25 @@
 "induciendo así a niños y personas influenciables a gastar dinero en el 
juego."
 
 #. type: Content of: <div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "La mayoría de las aplicaciones son <cite>malware</cite>, pero la aplicación 
"

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/proprietary.fr.po    13 Jul 2020 10:15:46 -0000      1.338
+++ proprietary/po/proprietary.fr.po    17 Jul 2020 19:02:15 -0000      1.339
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-07-13 12:15+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -365,11 +366,25 @@
 "et les personnes influençables à dépenser de l'argent en jouant."
 
 #. type: Content of: <div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "La plupart des applis sont des logiciels malveillants, mais l'appli de "

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary/po/proprietary.it-diff.html     13 Jul 2020 10:02:36 -0000      
1.175
+++ proprietary/po/proprietary.it-diff.html     17 Jul 2020 19:02:15 -0000      
1.176
@@ -247,8 +247,8 @@
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
@@ -326,7 +326,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- proprietary/po/proprietary.it.po    13 Jul 2020 10:02:36 -0000      1.213
+++ proprietary/po/proprietary.it.po    17 Jul 2020 19:02:15 -0000      1.214
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -497,8 +497,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary/po/proprietary.ja-diff.html     13 Jul 2020 10:02:36 -0000      
1.179
+++ proprietary/po/proprietary.ja-diff.html     17 Jul 2020 19:02:15 -0000      
1.180
@@ -245,8 +245,8 @@
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
@@ -324,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary/po/proprietary.ja.po    13 Jul 2020 10:02:36 -0000      1.197
+++ proprietary/po/proprietary.ja.po    17 Jul 2020 19:02:15 -0000      1.198
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -358,8 +358,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary/po/proprietary.nl-diff.html     13 Jul 2020 10:02:36 -0000      
1.176
+++ proprietary/po/proprietary.nl-diff.html     17 Jul 2020 19:02:15 -0000      
1.177
@@ -247,8 +247,8 @@
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
@@ -326,7 +326,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary/po/proprietary.nl.po    13 Jul 2020 10:02:36 -0000      1.187
+++ proprietary/po/proprietary.nl.po    17 Jul 2020 19:02:15 -0000      1.188
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -401,8 +401,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary/po/proprietary.pl-diff.html     13 Jul 2020 10:02:36 -0000      
1.193
+++ proprietary/po/proprietary.pl-diff.html     17 Jul 2020 19:02:15 -0000      
1.194
@@ -245,8 +245,8 @@
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
@@ -324,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary/po/proprietary.pl.po    13 Jul 2020 10:02:36 -0000      1.180
+++ proprietary/po/proprietary.pl.po    17 Jul 2020 19:02:15 -0000      1.181
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -578,8 +578,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- proprietary/po/proprietary.pot      13 Jul 2020 10:02:36 -0000      1.177
+++ proprietary/po/proprietary.pot      17 Jul 2020 19:02:15 -0000      1.178
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -295,8 +295,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a "
-"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
 "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
 "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- proprietary/po/proprietary.pt-br.po 13 Jul 2020 10:02:36 -0000      1.310
+++ proprietary/po/proprietary.pt-br.po 17 Jul 2020 19:02:15 -0000      1.311
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-06-30 08:27-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -346,11 +346,18 @@
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "A maioria dos aplicativos são malware, mas o aplicativo de campanha do "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.372
retrieving revision 1.373
diff -u -b -r1.372 -r1.373
--- proprietary/po/proprietary.ru.po    13 Jul 2020 11:00:39 -0000      1.372
+++ proprietary/po/proprietary.ru.po    17 Jul 2020 19:02:15 -0000      1.373
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -369,11 +370,25 @@
 "игру детьми и впечатлительными людьми."
 
 #. type: Content of: <div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "Большинство приложений вредоносны, но 
приложение кампании Трампа, как и "

Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary.tr.po    13 Jul 2020 17:32:52 -0000      1.38
+++ proprietary/po/proprietary.tr.po    17 Jul 2020 19:02:15 -0000      1.39
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-07-13 19:27+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.3\n"
 
@@ -360,11 +361,18 @@
 "kişiler oyunda para harcamaya teşvik ediliyor."
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "Çoğu uygulama kötücül yazılımdır, ancak Trump'ın kampanya 
uygulaması, "

Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary.zh-cn.po 15 Jul 2020 09:31:56 -0000      1.36
+++ proprietary/po/proprietary.zh-cn.po 17 Jul 2020 19:02:15 -0000      1.37
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-07-15 15:17+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -337,11 +338,18 @@
 "数,因
此这是在鼓励儿童和自控能力差的人在游戏上花费。"
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "大多数的应用都是恶意软件,但是川普的竞选应用和 Modi 
的竞选应用类似,是 <a "

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary/po/proprietary.zh-tw-diff.html  13 Jul 2020 10:02:36 -0000      
1.156
+++ proprietary/po/proprietary.zh-tw-diff.html  17 Jul 2020 19:02:15 -0000      
1.157
@@ -248,8 +248,8 @@
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
-    "&gt;especially nasty malware, helping companies snoop on users as well
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
@@ -327,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary/po/proprietary.zh-tw.po 13 Jul 2020 10:02:36 -0000      1.167
+++ proprietary/po/proprietary.zh-tw.po 17 Jul 2020 19:02:15 -0000      1.168
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -471,8 +471,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- proprietary/po/pt-br.po     13 Jul 2020 10:02:36 -0000      1.259
+++ proprietary/po/pt-br.po     17 Jul 2020 19:02:15 -0000      1.260
@@ -5598,11 +5598,18 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "A maioria dos aplicativos são malware, mas o aplicativo de campanha do "
@@ -9071,6 +9078,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
 "when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
@@ -9816,6 +9834,20 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "A maioria dos aplicativos são malware, mas o aplicativo de campanha do "
+#~ "Trump, assim como o aplicativo de campanha do Modi, é um <a href="
+#~ "\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-";
+#~ "invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+#~ "\">malware especialmente nojento, ajudando empresas a bisbilhotar "
+#~ "usuários assim como a eles mesmos</a>."
+
 #, fuzzy
 #~| msgid ""
 #~| "As of January, 2020, the pages in this directory list around 450 "

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.434
retrieving revision 1.435
diff -u -b -r1.434 -r1.435
--- proprietary/po/ru.po        13 Jul 2020 11:30:33 -0000      1.434
+++ proprietary/po/ru.po        17 Jul 2020 19:02:15 -0000      1.435
@@ -6929,11 +6929,25 @@
 "позволяет превращать их в штатные 
подслушивающие устройства."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# | 
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# | 
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\";>
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "Большинство приложений вредоносны, но 
приложение кампании Трампа, как и "
@@ -10987,6 +11001,39 @@
 "записывает все нажатия на клавиши</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | The <a
+# | 
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\";>
+# | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# | 
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\";>which-]
+# | 
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+#| "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+#| "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet.";
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
+msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+"<a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-";
+"diagnostic-data-in-your-organization#full-level\">&ldquo;Полный&rdquo; 
режим "
+"телеметрии</a> позволяет инженерам Microsoft 
Windows получить доступ, кроме "
+"прочего, к ключам реестра, <a 
href=\"https://technet.microsoft.com/en-us/";
+"library/cc939702.aspx\">которые могут содержать 
такую конфиденциальную "
+"информацию, как пароль учетной записи 
администратора</a>."
+
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
@@ -11829,6 +11876,20 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "Большинство приложений вредоносны, но 
приложение кампании Трампа, как и "
+#~ "приложение кампании Моди, <a 
href=\"https://www.technologyreview.";
+#~ "com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-"
+#~ "surveillance-tool-of-extraordinary-scope/ \">особенно 
скверно: оно и "
+#~ "помогает компаниям подглядывать за 
пользователями, и подглядывает за ними "
+#~ "само</a>."
+
+#~ msgid ""
 #~ "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.";
 #~ "org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"
 #~ "\"> coerce workers into installing in their own computers</a>, so the "

Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/tr.po        13 Jul 2020 10:02:36 -0000      1.33
+++ proprietary/po/tr.po        17 Jul 2020 19:02:15 -0000      1.34
@@ -4867,11 +4867,18 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "Çoğu uygulama kötücül yazılımdır, ancak Trump'ın kampanya 
uygulaması, "
@@ -8020,6 +8027,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
 "when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
@@ -8709,6 +8727,20 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "Çoğu uygulama kötücül yazılımdır, ancak Trump'ın kampanya 
uygulaması, "
+#~ "Modi'nin kampanya uygulaması gibi, <a 
href=\"https://www.technologyreview.";
+#~ "com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-"
+#~ "surveillance-tool-of-extraordinary-scope/ \">özellikle nahoş kötücül "
+#~ "yazılımdır, hem şirketlerin hem de uygulama sahiplerinin 
kullanıcıları "
+#~ "gizlice gözetlemesine yardımcı oluyor</a>."
+
 #, fuzzy
 #~| msgid ""
 #~| "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.";

Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/zh-cn.po     15 Jul 2020 08:00:04 -0000      1.29
+++ proprietary/po/zh-cn.po     17 Jul 2020 19:02:15 -0000      1.30
@@ -4802,17 +4802,24 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 "大多数的应用都是恶意软件,但是川普的竞选应用和 Modi 
的竞选应用类似,是 <a "
 "href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
 "hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ \">"
-"尤其低劣的恶意软件,它本身就在帮助私企嗅探用户也在嗅
探他们自己。"
+"尤其低劣的恶意软件,它本身就在帮助私企嗅探用户也在嗅
探他们自己</a>。"
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -7804,6 +7811,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
 "when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
@@ -8535,6 +8553,18 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
 
+#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "大多数的应用都是恶意软件,但是川普的竞选应用和 Modi 
的竞选应用类似,是 <a "
+#~ "href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
+#~ "hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+#~ "\">尤其低劣的恶意软件,它本身就在帮助私企嗅
探用户也在嗅探他们自己。"
+
 #, fuzzy
 #~| msgid ""
 #~| "As of January, 2020, the pages in this directory list around 450 "

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary/po/zh-tw.po     13 Jul 2020 10:02:36 -0000      1.196
+++ proprietary/po/zh-tw.po     17 Jul 2020 19:02:15 -0000      1.197
@@ -4878,8 +4878,8 @@
 msgid ""
 "Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
 "is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-";
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
 "snooping on them itself</a>."
 msgstr ""
 
@@ -8068,6 +8068,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
+"windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
+"Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.";
 "com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
 "when-windows-10-is-sleeping\"> Intel devices will be able to listen for "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]